fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Rytk\u00f6nen, Janne", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-04-25T09:15:50Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-04-25T09:15:50Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2016", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1526176", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/49535", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Identiteetti- ja p\u00e4\u00e4synhallinta k\u00e4sitteet alkoivat yleisty\u00e4 vuoden 2000 j\u00e4lkeen. Aihe jakautuu identiteettihallintaan ja p\u00e4\u00e4synhallintaan. Identiteetinhallinta voidaan jakaa k\u00e4ytt\u00e4j\u00e4hallintaan ja keskitettyyn k\u00e4ytt\u00e4j\u00e4hakemistoon. P\u00e4\u00e4synhallinta voidaan jakaa todennukseen ja valtuutuksiin. Nykyp\u00e4iv\u00e4n\u00e4 on monia eri teknologioita, mit\u00e4 voidaan k\u00e4ytt\u00e4\u00e4 t\u00e4h\u00e4n tarkoitukseen ja aihe on laajasti tutkittu. Tutkielman tarkoituksena on tutustua IAM-perusteisiin, s\u00e4hk\u00f6isiin identiteetteihin ja erilaisiin tunnistusmenetelmiin. Tutkielmassa k\u00e4sittelleen s\u00e4hk\u00f6isten identiteettien ja tunnistusmenetelmien m\u00e4\u00e4rittelyyn liittyvi\u00e4 tekij\u00f6it\u00e4. Vahvat ja heikot tunnistusmenetelm\u00e4t k\u00e4yd\u00e4\u00e4n l\u00e4pi kirjallisuuskatsauksen perusteella. Tutkielmassa esitell\u00e4\u00e4n kirjallisuuskatsauksen pohjalta nousseista tunnistautumisen heikkouksista ja vahvuuksista kysymykset, joita voidaan k\u00e4ytt\u00e4\u00e4 apuna tunnistuksen suunnittelussa. Tutkielman tutkimusongelmina ovat: \u201d1. Mit\u00e4 asioita digitaalisten identiteettien m\u00e4\u00e4rittelyss\u00e4 tulee huomioida?\u201d, \u201d2. Millaisia tunnistautumismenetelmi\u00e4 on olemassa? Ja millaisia niiden sis\u00e4lt\u00e4m\u00e4t vahvuudet ja heikkoudet ovat?\u201d, \u201d3. Miten voimme arvioida tunnistautumismenetelmi\u00e4?\u201d. Tutkimusongelmia esitell\u00e4\u00e4n esimerkkikuvausten mukaisesti, kirjallisuusanalyysiin pohjautuen ja kirjoittajan kokemuksien perusteella. Gradussa esitet\u00e4\u00e4n tiivistetysti, mit\u00e4 s\u00e4hk\u00f6isten identiteettien m\u00e4\u00e4rittelyss\u00e4 tulee huomioida. S\u00e4hk\u00f6isten identiteettien m\u00e4\u00e4rittelyss\u00e4 edet\u00e4\u00e4n tunnistus- ja todennusmenetelmiin sek\u00e4 niihin liittyviin piirteisiin. Tunnistus- ja todennusmenetelmien j\u00e4lkeen kerrotaan vahvoista tunnistautumismenetelmist\u00e4 ja tunnistuksen arvioinnista. Tunnistuksen arvioinnin j\u00e4lkeen kerrotaan vahvasta tunnistuksesta Suomessa. Tutkimuksessa k\u00e4sitellyist\u00e4 asioista muodostettiin kysymykset, jotka ovat n\u00e4ht\u00e4vill\u00e4 kappaleessa 8. Tutkielman tarkoituksena on antaa tietoa yrityksille asioista, jotka liittyv\u00e4t identiteetti- ja k\u00e4ytt\u00f6valtuushallinnassa digitaalisten identiteettien ja tunnistautumismenetelmien m\u00e4\u00e4rittelyyn.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The identity and access management concepts became more common after 2000s. The subject is divided to identity management (IdM) and access management (AM). Identity management can be divided to user management and central user repository. Access management can be divided to authentication and authorization. The topic have been researched extensively and nowadays there are many different technologies what you can be used for that purpose. The aim of this master's thesis is to research IAM basics, digital identities and different identification methods. The research goes through what things include and should be taken into account when digital identities and identification methods are defined. Weak and strong identification methods are shown based on literature review. Thesis research problems are: \u201c1. What things should be taken into account when defining digital indentities?\u201d, \u201c2. What kind of identity methods are there?\" And what kind of strengths and weaknesses those have?\"3. How we can estimate identification solutions?\" The research problems are demonstrated with examples and processed based on literature review and on writers own experience. Those things which should be taken into account when defining digital identities are summarized in thesis. How different identification and authentication methods work are researched. After defining identification and authentication methods we are going to take a look to strong identification methods and how to estimate identification. We are going to take look what strong identification methods are used in Finland after estimating identification. Questions formed from the thesis content are shown in chapter 8. The aim of this thesis is to give information to organisations about the identity access management, digital identitities and identification methods.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Janne Rytk\u00f6nen (jasarytk) on 2016-04-25 09:15:50.159196. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =False]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-04-25T09:15:50Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201604252302.pdf: 1687241 bytes, checksum: 369192996d11129935a4514f24ba8734 (MD5)\r\nlicense.html: 1140 bytes, checksum: 4d49661a9dc583f2eaa310da650f320c (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-04-25T09:15:50Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201604252302.pdf: 1687241 bytes, checksum: 369192996d11129935a4514f24ba8734 (MD5)\r\nlicense.html: 1140 bytes, checksum: 4d49661a9dc583f2eaa310da650f320c (MD5)\r\n Previous issue date: 2016", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (124 s.)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Identiteetin- ja p\u00e4\u00e4synhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "identiteetinhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "p\u00e4\u00e4synhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "s\u00e4hk\u00f6inen identiteetti", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoj\u00e4rjestelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "autentikointi.", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "IAM : digitaaliset identiteetit, tunnistautumis- ja todennusmenetelm\u00e4t", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.title.alternative", "value": "Digitaaliset identiteetit, tunnistautumis- ja todennusmenetelm\u00e4t", "language": null, "element": "title", "qualifier": "alternative", "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201604252302", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Tietojenk\u00e4sittelytieteiden laitos", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Department of Computer Science and Information Systems", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-04-25T09:15:51Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "s\u00e4hk\u00f6inen tunnistaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "identifiointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "todentaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/en/workspaces/facilities.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Aineistoon p\u00e4\u00e4sy\u00e4 on rajoitettu tekij\u00e4noikeussyist\u00e4. Aineisto on luettavissa Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6asemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|