• Jul 03, 2017 News!JACN Vol.4, No.2 has been indexed by EI (inspec)!   [Click]
  • Jul 12, 2017 News!JACN Vol.5, No.1 has been published with online version.
  • Jul 03, 2017 News!Welcome to join in the 2017 8th International Conference on Networking and Information Technology (ICNIT 2017), which will be held in Penang, Malaysia during November 24-26, 2017.
General Information
    • ISSN: 1793-8244
    • Frequency: Semiyearly
    • DOI: 10.18178/JACN
    • Editor-in-Chief: Dr. Ka Wai Gary Wong
    • Executive Editor: Ms. Nina Lee
    • Abstracting/ Indexing: EI (INSPEC, IET), Engineering & Technology Digital Library, DOAJ, Electronic Journals Library, Ulrich's Periodicals Directory, International Computer Science Digital Library (ICSDL), ProQuest, and Google Scholar.
    • E-mail: jacn@ejournal.net
Editor-in-chief
Dr. Ka Wai Gary Wong
Division of Information and Technology Studies, Faculty of Education, The University of Hong Kong.
It's a honor to serve as the editor-in-chief of JACN. I'll work together with the editors and reviewers to help the journal progress
JACN 2015 Vol.3(2): 150-156 ISSN: 1793-8244
DOI: 10.7763/JACN.2015.V3.158

Systematic Review of Identity Access Management in Information Security

Mumina Uddin and David Preston
Abstract—This report is a systematic review on Identity Access Management (IAM) in information security. Objective of this report is to identify the intensity of the research on IAM solution, which particular Taxonomy of security has been researched upon most and the area under-researched . Data source were original articles written in English found in IEEE explore, Science Direct, ACM Digital Library, Google Scholars. Study selections were articles related to Identity access management / Access Control within the information security, information management area. Article excluded that were industry specific and role engineering. Data extracted by search engine using predefined search string which contain 127 articles, it was reviewed manually using the title and the abstract initially using the predefined eligibility criteria. A total of 40 articles were selected for the purpose of this study, after screening through detailed reading of the articles a total of 18 articles selected for the review. It revealed IAM solution has not been adopted efficiently it is an emerging technology and have received interests from wider organization. Data security, Compliance has been researched most due to the security breach, data loss incidences. Bring it your own (BOYD) security within personal mobile technology have posed threats and vulnerabilities, security awareness, policy and best practices have thought to be the factors contributing to the failure in information security. It is the technology, people and process needs to work coherently to have secure information system.

Index Terms—Information security, identity access management, articles.

Mumina Uddin and David Preston are with the University of East London, Chingford, UK (e-mail:u1146764@uel.ac.uk, d.preston@uel.ac.uk).

[PDF]

Cite:Mumina Uddin and David Preston, "Systematic Review of Identity Access Management in Information Security," Journal of Advances in Computer Networks vol. 3, no. 2, pp. 150-156, 2015.

Copyright © 2008-2017. Journal of Advances in Computer Networks.  All rights reserved.
E-mail: jacn@ejournal.net