首页> 外文会议>Systems and Information Engineering Design Symposium >Analysis of Identity and Access Management alternatives for a multinational information-sharing environment
【24h】

Analysis of Identity and Access Management alternatives for a multinational information-sharing environment

机译:分析跨国信息共享环境中的身份和访问管理替代方案

获取原文

摘要

In the 21st century, each country must make decisions on how to utilize modern technologies to maximize benefits and minimize repercussions. For example, the United States Department of Defense (DoD) needs to be able to share information efficiently with its allies while simultaneously preventing unwarranted access or attacks. These attacks pose a threat to the national security of the United States, but proper use of the cyberspace provides countless benefits. The aim of this paper is to explore Identity and Access Management (IdAM) technologies that the Department of Defense can use in joint operations with allies that will allow efficient information-sharing and enhance security. To this end, we have created a methodology and a model for evaluating Identity and Access Management technologies that the Department of Defense can use in joint operations with other nations, with a specific focus on Japan and Australia. To evaluate these systems, we employed an approach that incorporates Political, Operational, Economic and Technical (POET) factors. Governance protocols, technological solutions, and political factors were first thoroughly reviewed and then used to construct an evaluation model to formally assess Identity and Access Management alternatives. This model provides systematic guidance on how the Department of Defense can improve their use of Identity and Access Management systems in the future.
机译:在21世纪,每个国家都必须就如何利用现代技术最大化收益和最小化影响做出决策。例如,美国国防部(DoD)需要能够与其盟友有效地共享信息,同时防止不必要的访问或攻击。这些攻击对美国的国家安全构成威胁,但正确使用网络空间可带来无数好处。本文旨在探讨国防部可以在与盟国的联合行动中使用的身份和访问管理(IdAM)技术,以实现有效的信息共享并增强安全性。为此,我们创建了一种评估身份和访问管理技术的方法和模型,美国国防部可以在与其他国家的联合行动中使用这些方法和模型,特别侧重于日本和澳大利亚。为了评估这些系统,我们采用了一种结合了政治,运营,经济和技术(POET)因素的方法。首先对治理协议,技术解决方案和政治因素进行了彻底的审查,然后将其用于构建评估模型,以正式评估身份和访问管理的替代方案。该模型为国防部将来如何改善其身份和访问管理系统的使用提供了系统的指导。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号