Global scale identity management attempts to be the system of identifying and authenticating entities such as people, hardware devices, distributed sensors and actuators, and software applications when accessing critical information technology (IT) systems from anywhere. The term global-scale is intended to emphasize the pervasive nature of identities and implies the existence of identities in federated systems that may be beyond the control of any single organization. The purpose of this research was to analyze the current state of Global Scale Identity Management. Today, news of security breaches is far too commonplace. The results reveal that global scale identity management would have a positive effect on the individual person, businesses, government agencies, and institutions. However for global scale identity management to be operational much work remains. The remaining work is split between the physical realm, i.e., biometric equipment, quantum resistant cryptography, and the abstract realm, i.e., legal considerations, social and cultural mores, privacy issues, and international considerations. The research concluded that humans are repeatedly the weak link in password security that ultimately undermines a system’s stability. For the short term, the best suggestion is to use password managers and have systems disallow poor password choices. For the long-term build infrastructures with quantum resistant cryptography interfacing with the ubiquitous smartphone to provide multifactor authentication.
|Advisor:||Riddell, Christopher, Lee, Robert|
|School Location:||United States -- New York|
|Source:||MAI 55/02M(E), Masters Abstracts International|
|Subjects:||Information Technology, Computer science|
|Keywords:||Federated, Identity, Multifactor authentication, Quantum resistant cryptography, Qubit|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be