Authentication Revolution using Bring Your Own Identity

Journal Title: International Journal of Scientific Research and Management - Year 2015, Vol 3, Issue 6

Abstract

With the growing acceptance of cloud - based services, it is becoming less important where an identity access management (IAM) system actually resides. Proponents of BYOI D maintain that traditional identity provisioning is no longer necessary and allowing a third party to assume the security, privacy and compliance burdens associated with IAM reduces administrative overhead, simplifies data management and lowers storage co sts. Adversaries warn that BYOI D has too many risks, including the potential for compromised identities and identity theft. In the enterprise, BYOI D may be called identity as a service (IDaaS). IDaaS for the enterprise is typically purchased as a subscript ion - based managed service that provides subscribers with role - based access to specific applications or virtualized desktops through a secure portal

Authors and Affiliations

Supriya N. Kolambkar

Keywords

Related Articles

HIV Seroprevalence Among Tuberculosis Patients Visiting Rntcp Centre In A Tertiary Care Hospital In Andhra Pradesh

Tuberculosis is the commonest opportunistic infection occurring among HIV - positive individuals in India and it is estimated that 60 - 70 per cent of HIV - positive patients will develop tuberculosis in their lifetime....

Knowledge Sharing: Collaboration between Universities and Industry Organizations

Human being while traveling through Rural , Agricultural and Industrial Societies has now reached to the Knowledge Society . With the advancement of Information and Communication Technology, there are now...

Recruitment As A Source To Generate A Pool Of Qualified Applicants

Recruitment of candidates is a major function of management process. It is the function preceding the selection, which help s to create a pool of qualified applicant for a job so that the management can select the right...

Email System for Disabled

Email System for Disabled is an application for the disabled people. The disabled people particularly mean the handicapped o r the blind people who cannot type on the keyboard. This application is aimed at helping suc...

Experimental Analysis Of Vapour Compression Refrigeration System For Optimum Performance With Low Pressure Receiver

Refrigerator is a device used for chilling of food products for the both commercial and domestic applianc es utilizing mechanical vapour compression Cycle in it s process. Optimization for the better performanc...

Download PDF file
  • EP ID EP216928
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

Supriya N. Kolambkar (2015). Authentication Revolution using Bring Your Own Identity. International Journal of Scientific Research and Management, 3(6), -. https://europub.co.uk/articles/-A-216928