fullrecord |
[{"key": "dc.contributor.advisor", "value": "Clements, Kati", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "V\u00e4lim\u00e4ki, Mona", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-11-04T09:40:38Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-11-04T09:40:38Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/66138", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Identiteetin- ja p\u00e4\u00e4synhallinta on merkitt\u00e4v\u00e4 osa tietoj\u00e4rjestelmien tietoturvaa. Tietoj\u00e4rjestelm\u00e4n on mahdollistettava sen kohderesurssien suojaaminen luvattomalta tiedonkululta ja muokkaukselta sallien kuitenkin p\u00e4\u00e4sy valtuutetuille k\u00e4ytt\u00e4jille ja k\u00e4ytt\u00f6oikeuksille. Ennen p\u00e4\u00e4syoikeuksien toteutumista tulee k\u00e4ytt\u00e4j\u00e4n tai muun p\u00e4\u00e4syoikeuspyynt\u00f6\u00e4 esitt\u00e4v\u00e4n s\u00e4hk\u00f6isen identiteetin alkuper\u00e4 todentaa. S\u00e4hk\u00f6isell\u00e4 identiteetill\u00e4 tarkoitetaan verkkoymp\u00e4rist\u00f6ss\u00e4 ilmenev\u00e4\u00e4 entiteetti\u00e4, johonka liitetyill\u00e4 attribuuttien arvoilla entiteetti pystyt\u00e4\u00e4n yksil\u00f6im\u00e4\u00e4n. Esimerkkin\u00e4 attribuutin arvoista k\u00e4y muun muassa k\u00e4ytt\u00e4j\u00e4n sijainti tai puhelinnumero. Identiteetin todentaminen tapahtuu autentikoinnilla, jossa n\u00e4m\u00e4 entiteetin ominaisuudet varmennetaan todenmukaisiksi. S\u00e4hk\u00f6isen identiteetin todentaminen on yksi prosesseista, jotka luetaan osaksi identiteetinhallintaa. P\u00e4\u00e4synhallinnalla tarkoitetaan puolestaan menettelyit\u00e4, joilla varmistetaan, ett\u00e4 k\u00e4ytt\u00e4j\u00e4t, laitteet, sovellukset ja j\u00e4rjestelm\u00e4t p\u00e4\u00e4sev\u00e4t k\u00e4ytt\u00e4m\u00e4\u00e4n tietoj\u00e4rjestelmiss\u00e4 olevaa tietoa roolinsa mukaisesti. P\u00e4\u00e4synhal-linnan keskeisin teht\u00e4v\u00e4 on valvoa tietoj\u00e4rjestelm\u00e4n p\u00e4\u00e4syoikeuksia siten, ett\u00e4 vain valtuutetut p\u00e4\u00e4syoikeudet voivat tapahtua. Valtuutetulla eli auktorisoidulla p\u00e4\u00e4syoikeudella tarkoitetaan my\u00f6nnetty\u00e4 oikeutta k\u00e4ytt\u00e4\u00e4 resursseja todentamisen j\u00e4lkeen. Eri p\u00e4\u00e4synhallintamalleja ja -mekanismeja on useita ja t\u00e4ss\u00e4 kandidaatintutkielmassa tarkastellaan l\u00e4hemmin harkinnanvaraista, pakollista ja roolipohjaista p\u00e4\u00e4synhallintaa. Tutkielma on toteutettu kirjallisuuskatsauksena ja siin\u00e4 pyrit\u00e4\u00e4n vastaamaan kysymyksiin \u201dMiten s\u00e4hk\u00f6ist\u00e4 identiteetti\u00e4 hy\u00f6dynnet\u00e4\u00e4n p\u00e4\u00e4synhallinnassa?\u201d ja \u201dMit\u00e4 p\u00e4\u00e4synhallintamalleja on olemassa ja tarjolla?\u201d.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Identity and access management is a major part of the security of information systems. The information system must protect its target resources from unauthorized data transmissions and edits while allowing entrance to authorized users and access rights. User or other digital identity requesting access must have their source verified before access rights can be fulfilled. Digital identity signifies to an entity that appears in a network and it can be identified using attribute values that are associated with specific entity. User\u2019s location and phone number are examples of attribute values. Identity\u2019s attestation takes place through authentication, where entity properties are verified to be true. The authentication of digital identity is one of the processes associated with identity management. Access management, in turn, refers to procedures that ensure users, devices, applications and systems have access to information according to their role. The main task of access control is to navigate access rights to the information system thereby only authorized access rights can take a place. Authorized access rights mean admitted rights to use resources after authentication. There are many recognized access control models and policies. This study examines discretionary, mandatory and role-based access control. The study is made as a literature review and its attempts to answer questions \u201cHow is digital identity utilized in access control?\u201d and \u201cWhat access control models exist and are available?\u201d.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-11-04T09:40:38Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-11-04T09:40:38Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "30", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "s\u00e4hk\u00f6inen identiteetti", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "p\u00e4\u00e4synhallinta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "S\u00e4hk\u00f6inen identiteetti osana tietoj\u00e4rjestelmien p\u00e4\u00e4synhallintaa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201911044705", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "valtuutus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoj\u00e4rjestelm\u00e4t", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "todentaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|