Abstract—This report is a systematic review on Identity
Access Management (IAM) in information security. Objective
of this report is to identify the intensity of the research on IAM
solution, which particular Taxonomy of security has been
researched upon most and the area under-researched . Data
source were original articles written in English found in IEEE
explore, Science Direct, ACM Digital Library, Google Scholars.
Study selections were articles related to Identity access
management / Access Control within the information security,
information management area. Article excluded that were
industry specific and role engineering. Data extracted by search
engine using predefined search string which contain 127 articles,
it was reviewed manually using the title and the abstract
initially using the predefined eligibility criteria. A total of 40
articles were selected for the purpose of this study, after
screening through detailed reading of the articles a total of 18
articles selected for the review. It revealed IAM solution has not
been adopted efficiently it is an emerging technology and have
received interests from wider organization. Data security,
Compliance has been researched most due to the security
breach, data loss incidences. Bring it your own (BOYD) security
within personal mobile technology have posed threats and
vulnerabilities, security awareness, policy and best practices
have thought to be the factors contributing to the failure in
information security. It is the technology, people and process
needs to work coherently to have secure information system.
Index Terms—Information security, identity access
management, articles.
Mumina Uddin and David Preston are with the University of East London, Chingford, UK (e-mail:u1146764@uel.ac.uk, d.preston@uel.ac.uk).
[PDF]
Cite:Mumina Uddin and David Preston, "Systematic Review of Identity Access Management in Information Security," Journal of Advances in Computer Networks vol. 3, no. 2, pp. 150-156, 2015.