Comparative analysis of identity management, access control, and authorization practices in public and private universities.

Open Res Eur

Faculty of Information Sciences and Computer Engineering, Ss. Cyril and Methodius University, Skopje, North Macedonia, 1000, North Macedonia.

Published: July 2024

Background: This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities. Identity management involves the meticulous management and control of user identities, encompassing the establishment and maintenance of user profiles, role assignments, and access privileges. Access control is the practice of defining and enforcing policies that govern who can access an IT system or application and which resources they can interact with. Authorization, meanwhile, determines the specific actions and privileges granted to users based on their roles and permissions.

Methods: To understand the variances in identity management and access control approaches, we conducted a comparative analysis between public and private universities. Our investigation scrutinized the user populations with access to university systems, the enforcement of access limitations, authentication methods, and password policies. Additionally, we examined the nuances of authorization processes, levels of authorization, access approval authorities, user status and role changes, unique user account management, account deletion procedures, user authentication methods, password complexity and expiration policies, password storage methods, and session termination policies.

Results: This study revealed that both public and private universities prioritize these security measures, with a common categorization of these processes. Nevertheless, there exist disparities, such as the inclusion of contractors and vendors in the user population at private universities, the manual deletion of user accounts in private institutions, and variations in password policies and storage methods. Private universities tend to enforce stricter password policies, employ more secure password storage methods, and implement automatic session termination features.

Conclusions: This research provides valuable insights into the practices and approaches adopted by public and private universities to safeguard their digital environments. The findings serve as a valuable resource for enhancing identity management, access control, and authorization protocols, enabling institutions to fortify their cybersecurity defenses in an ever-evolving threat landscape.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11294802PMC
http://dx.doi.org/10.12688/openreseurope.16634.2DOI Listing

Publication Analysis

Top Keywords

private universities
28
identity management
20
access control
20
public private
20
management access
16
control authorization
12
password policies
12
storage methods
12
access
10
comparative analysis
8

Similar Publications

The study suggests a better multi-objective optimization method called 2-Archive Multi-Objective Cuckoo Search (MOCS2arc). It is then used to improve eight classical truss structures and six ZDT test functions. The optimization aims to minimize both mass and compliance simultaneously.

View Article and Find Full Text PDF

Weather recognition is crucial due to its significant impact on various aspects of daily life, such as weather prediction, environmental monitoring, tourism, and energy production. Several studies have already conducted research on image-based weather recognition. However, previous studies have addressed few types of weather phenomena recognition from images with insufficient accuracy.

View Article and Find Full Text PDF

Theory suggests that animals make hierarchical, multiscale resource selection decisions to address the hierarchy of factors limiting their fitness. Ecologists have developed tools to link population-level resource selection across scales; yet, theoretical expectations about the relationship between coarse- and fine-scale selection decisions at the individual level remain elusive despite their importance to fitness. With GPS-telemetry data collected across California, USA, we evaluated resource selection of mountain lions (Puma concolor; n = 244) relative to spatial variation in human-caused mortality risk.

View Article and Find Full Text PDF

Pediatric Acute Otitis Media Clinical Trials: An Analysis of Diversity.

Otolaryngol Head Neck Surg

December 2024

Department of Otolaryngology-Head and Neck Surgery, Boston Medical Center, Boston University Chobanian and Avedisian School of Medicine, Boston, Massachusetts, USA.

Objective: This study aims to assess the diversity and equity of pediatric acute otitis media (AOM) trials using ClinicalTrials.gov, focusing on participant demographics and representation to identify gaps in inclusivity and inform strategies for promoting diversity in future pediatric AOM studies.

Study Design: Retrospective analysis.

View Article and Find Full Text PDF

Objective: Chronic musculoskeletal pain (CMSP) is frequent in chronic diseases, decreasing the quality of life of these patients. In a survey conducted in Belgium in 2019, chronic pain was named by patients as the main factor of complexity in their lives. The objective of our research was to provide elements to understand why and how CMSP contributes to the complexity of these people's lives.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!