首页> 外文会议>Systems and Information Engineering Design Symposium >Analysis of Identity and Access Management alternatives for a multinational information-sharing environment
【24h】

Analysis of Identity and Access Management alternatives for a multinational information-sharing environment

机译:跨国信息共享环境的身份和访问管理替代品分析

获取原文

摘要

In the 21st century, each country must make decisions on how to utilize modern technologies to maximize benefits and minimize repercussions. For example, the United States Department of Defense (DoD) needs to be able to share information efficiently with its allies while simultaneously preventing unwarranted access or attacks. These attacks pose a threat to the national security of the United States, but proper use of the cyberspace provides countless benefits. The aim of this paper is to explore Identity and Access Management (IdAM) technologies that the Department of Defense can use in joint operations with allies that will allow efficient information-sharing and enhance security. To this end, we have created a methodology and a model for evaluating Identity and Access Management technologies that the Department of Defense can use in joint operations with other nations, with a specific focus on Japan and Australia. To evaluate these systems, we employed an approach that incorporates Political, Operational, Economic and Technical (POET) factors. Governance protocols, technological solutions, and political factors were first thoroughly reviewed and then used to construct an evaluation model to formally assess Identity and Access Management alternatives. This model provides systematic guidance on how the Department of Defense can improve their use of Identity and Access Management systems in the future.
机译:在21世纪,每个国家都必须决定如何利用现代技术来最大限度地利用益处和最小化影响。例如,美国国防部(国防部)需要能够在同时阻止无根据的访问或攻击时有效地与盟友有效分享信息。这些袭击对美国国家安全构成了威胁,但正确使用网络空间提供了无数的福利。本文的目的是探索国防部可以在与盟友共同运营中使用的身份和访问管理(IDAM)技术,这些技术将允许有效的信息共享和提高安全性。为此,我们已经创建了一种方法和模型,用于评估国防部可以在与其他国家的联合行动中使用的身份和访问管理技术,并在日本和澳大利亚的特定重点。为了评估这些系统,我们采用了一种融入政治,运营,经济和技术(诗人)因素的方法。首先彻底审查治理议定书,技术解决方案和政治因素,然后用于构建评估模型,以正式评估身份和访问管理替代方案。该模型提供了系统指导,关于国防部如何在未来改善其对身份和访问管理系统的使用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号