Title | Analysis of Identity and Access Management alternatives for a multinational information-sharing environment |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Calhoun, Z., Maribojoc, P., Selzer, N., Procopi, L., Bezzo, N., Fleming, C. |
Conference Name | 2017 Systems and Information Engineering Design Symposium (SIEDS) |
Keywords | access management alternative, Australia, authorisation, Authorization, computer security, cybersecurity, economic factor, Economics, Governance protocols, Human Behavior, identity analysis alternative, Identity and Access Management, identity and access management technologies, Identity management, Joint Information Environment, Linear programming, military communication, military computing, multinational information sharing environment, National security, operational factor, political factors, pubcrawl, reliability, Resiliency, Scalability, Systems Engineering, technical factor, technological solutions, US Department of Defense |
Abstract | In the 21st century, each country must make decisions on how to utilize modern technologies to maximize benefits and minimize repercussions. For example, the United States Department of Defense (DoD) needs to be able to share information efficiently with its allies while simultaneously preventing unwarranted access or attacks. These attacks pose a threat to the national security of the United States, but proper use of the cyberspace provides countless benefits. The aim of this paper is to explore Identity and Access Management (IdAM) technologies that the Department of Defense can use in joint operations with allies that will allow efficient information-sharing and enhance security. To this end, we have created a methodology and a model for evaluating Identity and Access Management technologies that the Department of Defense can use in joint operations with other nations, with a specific focus on Japan and Australia. To evaluate these systems, we employed an approach that incorporates Political, Operational, Economic and Technical (POET) factors. Governance protocols, technological solutions, and political factors were first thoroughly reviewed and then used to construct an evaluation model to formally assess Identity and Access Management alternatives. This model provides systematic guidance on how the Department of Defense can improve their use of Identity and Access Management systems in the future. |
DOI | 10.1109/SIEDS.2017.7937718 |
Citation Key | calhoun_analysis_2017 |