Integrated identity and access management metamodel and pattern system for secure enterprise architecture

被引:2
|
作者
Nahar, Kamrun [1 ]
Gill, Asif Qumer [1 ]
机构
[1] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW 2007, Australia
关键词
Identity management; Access control management; Metamodel; Ontology; Enterprise architecture; Design science research; DESIGN SCIENCE; ONTOLOGY; LANGUAGES;
D O I
10.1016/j.datak.2022.102038
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identity and access management (IAM) is one of the key components of the secure enterprise architecture for protecting the digital assets of the information systems. The challenge is: How to model an integrated IAM for a secure enterprise architecture to protect digital assets? This research aims to address this question and develops an ontology based integrated IAM metamodel for the secure digital enterprise architecture (EA). Business domain and technology agnostic characteristics of the developed IAM metamodel will allow it to develop IAM models for different types of information systems. Well-known design science research (DSR) methodology was adopted to conduct this research. The developed IAM metamodel is evaluated by using the demonstration method. Furthermore, as a part of the evaluation, a pattern system has been developed, consisting of eight IAM patterns. Each pattern offers a solution to a specific IAM related problem. The outcome of this research indicates that enterprise, IAM and information systems architects and academic researchers can use the proposed IAM metamodel and the pattern system to design and implement situation-specific IAM models within the overall context of a secure EA for information systems.
引用
收藏
页数:24
相关论文
共 50 条
  • [11] Identity and Access Management Architecture in the SILVANUS Project
    Rajba, Pawel
    Orzechowski, Natan
    Rzepka, Karol
    Szary, Przemyslaw
    Nastaj, Dawid
    Cabaj, Krzysztof
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [12] An integrated conceptual model for information system security risk management supported by enterprise architecture management
    Mayer, Nicolas
    Aubert, Jocelyn
    Grandry, Eric
    Feltus, Christophe
    Goettelmann, Elio
    Wieringa, Roel
    SOFTWARE AND SYSTEMS MODELING, 2019, 18 (03): : 2285 - 2312
  • [13] An Access Control Model for Organisational Management in Enterprise Architecture
    Gaaloul, Khaled
    Proper, H. A.
    2013 NINTH INTERNATIONAL CONFERENCE ON SEMANTICS, KNOWLEDGE AND GRIDS (SKG), 2013, : 37 - 43
  • [14] An integrated conceptual model for information system security risk management supported by enterprise architecture management
    Nicolas Mayer
    Jocelyn Aubert
    Eric Grandry
    Christophe Feltus
    Elio Goettelmann
    Roel Wieringa
    Software & Systems Modeling, 2019, 18 : 2285 - 2312
  • [15] An efficient and secure RFID-based online monitoring system architecture for enterprise asset management
    Jiang, Xiaoning
    Liu, Yanyan
    Leng, Yang
    Liu, Junqiang
    Gan, Zhigang
    Journal of Convergence Information Technology, 2012, 7 (21) : 220 - 227
  • [16] Applying Enterprise Architecture to the Design of the Integrated Forest Products Supply Chain Management System
    Marques, A. F.
    Borges, J. G.
    Sousa, P.
    Fonseca, M.
    Garcia, R.
    Batista, G.
    ENTERPRISE INFORMATION SYSTEMS PT II, 2010, 110 : 32 - +
  • [17] A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards
    Naik, Nitin
    Jenkins, Paul
    2016 4TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2016), 2016, : 89 - 90
  • [18] An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF
    Mayer, Nicolas
    Aubert, Jocelyn
    Grandry, Eric
    Feltus, Christophe
    PRACTICE OF ENTERPRISE MODELING, POEM 2016, 2016, 267 : 353 - 361
  • [19] Secure identity management for pseudo-anonymous service access
    Hitchens, M
    Kay, J
    Kummerfeld, B
    Brar, A
    SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2005, 3450 : 48 - 55
  • [20] Architecture of the integrated system for voice identity distribution
    Glowacki, Marcin
    Piotrowski, Zbignicw
    2012 19TH INTERNATIONAL CONFERENCE ON MICROWAVE RADAR AND WIRELESS COMMUNICATIONS (MIKON), VOLS 1 AND 2, 2012, : 542 - 545