Auflistung nach Schlagwort "IAM"
1 - 3 von 3
Treffer pro Seite
Sortieroptionen
- TextdokumentInformationsfluss in der Offshore Windenergie - Ein Referenzprozess für Betriebsführung und Instandhaltung(INFORMATIK 2021, 2021) Bendlin, Dirk; Werther Häckell, Moritz; Schwarzkopf, Marie-Antoinette; Kucewicz, Alicja Julia; Marx Gómez, JorgeDiese Arbeit untersucht, als Vorarbeit zum Forschungsprojekt WiSA Big Data (FKZ: 03EE3016E) das Geschäftsumfeld von Betriebs- und Instandhaltungsprojekten in der Offshore Windenergie. Speziell soll dabei eine generische und möglichst allgemeingültige Prozesslandkarte, angelehnt an das Institut für Asset Management (IAM) erstellt werden. Im Weiteren soll ein Kernprozess für die Betriebsführung und Instandhaltung von Offshore Windparks in der Business Process Model and Notation (BPMN) abgebildet werden. Die Hauptbeteiligten der Betriebsführung und Instandhaltung, werden exemplarisch in tabellarischer Form dargestellt. Dies wird auf Basis einer Literaturrecherche entwickelt. Mit diesem generischen Modell kann das Anforderungsprofil des im Forschungsprojekt geplanten Software Demonstrators domänenspezifisch gestaltet werden.
- KonferenzbeitragIntegration of Self-Sovereign Identity into Conventional Software using Established IAM Protocols: A Survey(Open Identity Summit 2022, 2022) Kuperberg, Michael; Klemens, RobinSelf-Sovereign Identity (SSI) is an approach based on asymmetric cryptography and on decentralized, user-controlled exchange of signed assertions. Most SSI implementations are not based on hierarchic certification schemas, but rather on the peer-to-peer and distributed “web of trust” without root or intermediate CAs. As SSI is a nascent technology, the adoption of vendor-independent SSI standards into existing software landscapes is at an early stage. Conventional enterprise-grade IAM implementations and cloud-based Identity Providers rely on widely established pre-SSI standards, and both will not be replaced by SSI offerings in the next few years. The contribution of this paper is an analysis of patterns and products to bridge unmodified pre-SSI applications and conventional IAM with SSI implementations. Our analysis covers 40+ SSI implementations and major authentication protocols such as OpenID Connect and LDAP.
- KonferenzbeitragPreservation of (higher) Trustworthiness in IAM for distributed workflows and systems based on eIDAS(Open Identity Summit 2022, 2022) Strack, H.; Karius, S.; Gollnick, M.; Lips, M.; Wefel, S.; Altschaffel, R.The secure digitalisation of distributed workflows with different stakeholders (and trust relationships) using systems from different stakeholder domains is of increasing interest. Just one example is the workflow/policy area of student mobility. Others are from public administration and from economic sectors. According to the eIDAS regulation, eID and trust services (TS) are available across EU - upcoming also EUid & wallets (eIDAS 2.0) - to improve security aspects (providing interoperability or standards). We present some security enhancements to maintainhigher trustworthiness in Identity and Access Management (IAM) services for different policy areas with mandatory, owner-based and self-sovereign control aspects - based on eIDAS and different standards and the integration of views/results from deployed or ongoing projects (EMREX/ELMO, Europass/ EDCI, eIDAS, EUid, Verifiable Credentials, NBP initiative, OZG implementation, Self-Sovereign Identities SSI, RBAC, ABAC, DAC/MAC, IPv6) and a trustistor.