• Feb 07, 2023 News!JACN will adopt Article-by-Article Work Flow. The benefit of article-by-article workflow is that a delay with one article may not delay the entire issue. Once a paper steps into production, it will be published online soon.   [Click]
  • May 30, 2022 News!JACN Vol.10, No.1 has been published with online version.   [Click]
  • Dec 24, 2021 News!Volume 9 No 1 has been indexed by EI (inspec)!   [Click]
General Information
    • ISSN: 1793-8244 (Print)
    • Abbreviated Title:  J. Adv. Comput. Netw.
    • Frequency: Semiyearly
    • DOI: 10.18178/JACN
    • Editor-in-Chief: Professor Haklin Kimm
    • Executive Editor: Ms. Cherry Chan
    • Abstracting/ Indexing: EBSCO, ProQuest, and Google Scholar.
    • E-mail: jacn@ejournal.net
Editor-in-chief
Professor Haklin Kimm
East Stroudsburg University, USA
I'm happy to take on the position of editor in chief of JACN. We encourage authors to submit papers on all aspects of computer networks.

JACN 2015 Vol.3(2): 150-156 ISSN: 1793-8244
DOI: 10.7763/JACN.2015.V3.158

Systematic Review of Identity Access Management in Information Security

Mumina Uddin and David Preston

Abstract—This report is a systematic review on Identity Access Management (IAM) in information security. Objective of this report is to identify the intensity of the research on IAM solution, which particular Taxonomy of security has been researched upon most and the area under-researched . Data source were original articles written in English found in IEEE explore, Science Direct, ACM Digital Library, Google Scholars. Study selections were articles related to Identity access management / Access Control within the information security, information management area. Article excluded that were industry specific and role engineering. Data extracted by search engine using predefined search string which contain 127 articles, it was reviewed manually using the title and the abstract initially using the predefined eligibility criteria. A total of 40 articles were selected for the purpose of this study, after screening through detailed reading of the articles a total of 18 articles selected for the review. It revealed IAM solution has not been adopted efficiently it is an emerging technology and have received interests from wider organization. Data security, Compliance has been researched most due to the security breach, data loss incidences. Bring it your own (BOYD) security within personal mobile technology have posed threats and vulnerabilities, security awareness, policy and best practices have thought to be the factors contributing to the failure in information security. It is the technology, people and process needs to work coherently to have secure information system.

Index Terms—Information security, identity access management, articles.

Mumina Uddin and David Preston are with the University of East London, Chingford, UK (e-mail:u1146764@uel.ac.uk, d.preston@uel.ac.uk).

[PDF]

Cite:Mumina Uddin and David Preston, "Systematic Review of Identity Access Management in Information Security," Journal of Advances in Computer Networks vol. 3, no. 2, pp. 150-156, 2015.

Copyright © 2008-2024. Journal of Advances in Computer Networks.  All rights reserved.
E-mail: jacn@ejournal.net