Systematic Review of Identity Access Management in Information Security

Mumina Uddin, David Preston
2015 Journal of Advances in Computer Networks  
This report is a systematic review on Identity Access Management (IAM) in information security. Objective of this report is to identify the intensity of the research on IAM solution, which particular Taxonomy of security has been researched upon most and the area under-researched . Data source were original articles written in English found in IEEE explore, Science Direct, ACM Digital Library, Google Scholars. Study selections were articles related to Identity access management / Access Control
more » ... within the information security, information management area. Article excluded that were industry specific and role engineering. Data extracted by search engine using predefined search string which contain 127 articles, it was reviewed manually using the title and the abstract initially using the predefined eligibility criteria. A total of 40 articles were selected for the purpose of this study, after screening through detailed reading of the articles a total of 18 articles selected for the review. It revealed IAM solution has not been adopted efficiently it is an emerging technology and have received interests from wider organization. Data security, Compliance has been researched most due to the security breach, data loss incidences. Bring it your own (BOYD) security within personal mobile technology have posed threats and vulnerabilities, security awareness, policy and best practices have thought to be the factors contributing to the failure in information security. It is the technology, people and process needs to work coherently to have secure information system.
doi:10.7763/jacn.2015.v3.158 fatcat:3knm76sd5jbdvj2ngfkvpbhdo4