2011
DOI: 10.1016/j.eswa.2011.04.226
|View full text |Cite
|
Sign up to set email alerts
|

Differentiated security levels for personal identifiable information in identity management system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…3, and give rating with 1-9 scale. Obtained the comparison matrix from the criteria level (shows in Table 4), and the subfactors level (shows in Tables 5,6,7). And then calculate the eigenvalues ( ) of these matrices by calculating sum of geometric mean (S. G. M.) of column vector.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…3, and give rating with 1-9 scale. Obtained the comparison matrix from the criteria level (shows in Table 4), and the subfactors level (shows in Tables 5,6,7). And then calculate the eigenvalues ( ) of these matrices by calculating sum of geometric mean (S. G. M.) of column vector.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The preliminary work what we need to do, first, we collected the literature relevant to risk assessment [7], [11]- [15], sorted out three categories of risk factors on Table 1, which caused risk of information assets disclosed or damaged, and the enterprises losses. Three categories of risk factors are human factors, environmental factors, and technological factors.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, a monitoring software should be used to ensure the consistency and completeness of the user activity log. Chen et al [30] noted that many enterprises implement automating user provisioning to enhance security, improve efficiency, reduce costs, maintain data quality and ensure regulation compliance. Cloud computing has changed the security landscape of enterprises from internal to external networks, with increased emphasis on identification, and message and data protection [31].…”
Section: Automating User Provisioningmentioning
confidence: 99%
“…[48] Periodic inspection of access (c 3 ) Periodic testing of identity management system to detect damage and ensure access security. [30,31] Operations (D)…”
Section: Dimensions/criteria Descriptions Referencesmentioning
confidence: 99%