filmov
tv
Decentralized Identity & Access Management in IoT || Vienna Digital Identity Conference
Показать описание
Dr. Xinxin Fan, Head of Cryptography of IoTeX, presents at the Vienna Digital Identity Conference with an excellent overview of the differences between centralized and decentralized IAM. He followed this with a deep discussion on the challenges and opportunities that are present as the transition to decentralized occurs.
IAM, or Identity Access Management is a critical component for every authentication and authorization system that regulates access control to system wide resources. Traditionally IAM systems have been engineered for the challenges and security concerning the access to systems by persons and have followed a centralized or federated model of access control. As the number of IoT devices continues to rapidly increase, and model of control moves from centralized to decentralized architectures IAM designs need to be rethought.
IAM, or Identity Access Management is a critical component for every authentication and authorization system that regulates access control to system wide resources. Traditionally IAM systems have been engineered for the challenges and security concerning the access to systems by persons and have followed a centralized or federated model of access control. As the number of IoT devices continues to rapidly increase, and model of control moves from centralized to decentralized architectures IAM designs need to be rethought.