Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Comparative analysis of identity management, access control, and authorization practices in public and private universities

View through CrossRef
Background This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities. Identity management involves the meticulous management and control of user identities, encompassing the establishment and maintenance of user profiles, role assignments, and access privileges. Access control is the practice of defining and enforcing policies that govern who can access an IT system or application and which resources they can interact with. Authorization, meanwhile, determines the specific actions and privileges granted to users based on their roles and permissions. Methods To understand the variances in identity management and access control approaches, we conducted a comparative analysis between public and private universities. Our investigation scrutinized the user populations with access to university systems, the enforcement of access limitations, authentication methods, and password policies. Additionally, we examined the nuances of authorization processes, levels of authorization, access approval authorities, user status and role changes, unique user account management, account deletion procedures, user authentication methods, password complexity and expiration policies, password storage methods, and session termination policies. Results This study revealed that both public and private universities prioritize these security measures, with a common categorization of these processes. Nevertheless, there exist disparities, such as the inclusion of contractors and vendors in the user population at private universities, the manual deletion of user accounts in private institutions, and variations in password policies and storage methods. Private universities tend to enforce stricter password policies, employ more secure password storage methods, and implement automatic session termination features. Conclusions This research provides valuable insights into the practices and approaches adopted by public and private universities to safeguard their digital environments. The findings serve as a valuable resource for enhancing identity management, access control, and authorization protocols, enabling institutions to fortify their cybersecurity defenses in an ever-evolving threat landscape.
Title: Comparative analysis of identity management, access control, and authorization practices in public and private universities
Description:
Background This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities.
Identity management involves the meticulous management and control of user identities, encompassing the establishment and maintenance of user profiles, role assignments, and access privileges.
Access control is the practice of defining and enforcing policies that govern who can access an IT system or application and which resources they can interact with.
Authorization, meanwhile, determines the specific actions and privileges granted to users based on their roles and permissions.
Methods To understand the variances in identity management and access control approaches, we conducted a comparative analysis between public and private universities.
Our investigation scrutinized the user populations with access to university systems, the enforcement of access limitations, authentication methods, and password policies.
Additionally, we examined the nuances of authorization processes, levels of authorization, access approval authorities, user status and role changes, unique user account management, account deletion procedures, user authentication methods, password complexity and expiration policies, password storage methods, and session termination policies.
Results This study revealed that both public and private universities prioritize these security measures, with a common categorization of these processes.
Nevertheless, there exist disparities, such as the inclusion of contractors and vendors in the user population at private universities, the manual deletion of user accounts in private institutions, and variations in password policies and storage methods.
Private universities tend to enforce stricter password policies, employ more secure password storage methods, and implement automatic session termination features.
Conclusions This research provides valuable insights into the practices and approaches adopted by public and private universities to safeguard their digital environments.
The findings serve as a valuable resource for enhancing identity management, access control, and authorization protocols, enabling institutions to fortify their cybersecurity defenses in an ever-evolving threat landscape.

Related Results

Primerjalna književnost na prelomu tisočletja
Primerjalna književnost na prelomu tisočletja
In a comprehensive and at times critical manner, this volume seeks to shed light on the development of events in Western (i.e., European and North American) comparative literature ...
Assessing university performance and strategic paths in the presence of multiple objectives
Assessing university performance and strategic paths in the presence of multiple objectives
Competitiveness and excellence heavily rely on the capacity of regions to innovate and transfer knowledge from academic institutions to society. In a scenario where these values ac...
Persons and Their Private Personas: Living with Yourself
Persons and Their Private Personas: Living with Yourself
Public life is usually understood to be whatever we do or say in our formal and professional relationships. At the workplace, at the doctor’s office or at the café, we need to make...
Proyectos arquitectónicos de posibles ciudades VS el proceso urbano: proyectar el espacio público a través del cine.
Proyectos arquitectónicos de posibles ciudades VS el proceso urbano: proyectar el espacio público a través del cine.
El objeto de investigación de este trabajo es el espacio público de la ciudad cinematográfica. Mediante la cinematografía alcanzar su objetivo que es, intentar comprender la relaci...
Introducing ‘Intimate Civility’: Towards a New Concept for 21st-Century Relationships
Introducing ‘Intimate Civility’: Towards a New Concept for 21st-Century Relationships
Fig. 1: Photo by Miguel Orós, from unsplash.comFeminism has stalled at the bedroom door. In the post-#metoo era, more than ever, we need intimate civil rights in our relationships ...
Predictors of Talent Retention among Academicians in Private Colleges and Universities in Yunnan Province
Predictors of Talent Retention among Academicians in Private Colleges and Universities in Yunnan Province
In the past few decades, private colleges and universities have made great progress in China and become indispensable to China's higher education system. In recent years, China's p...
HOW EFFICIENT ARE MALAYSIAN PUBLIC UNIVERSITIES? A COMPARATIVE ANALYSIS USING DATA ENVELOPMENT ANALYSIS
HOW EFFICIENT ARE MALAYSIAN PUBLIC UNIVERSITIES? A COMPARATIVE ANALYSIS USING DATA ENVELOPMENT ANALYSIS
This paper aims to examine the efficiency of Malaysian public universities in comparison with the private and foreign universities using Data Envelopment Analysis (DEA). The...
Public Art and Religion in America
Public Art and Religion in America
Public art in the United States has a long and complicated history through which nationalism and public monuments have often been intertwined. The most prominent public art forms h...

Back to Top