{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:05:30Z","timestamp":1774551930051,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/blackseacom61746.2024.10646296","type":"proceedings-article","created":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T17:34:13Z","timestamp":1725298453000},"page":"312-315","source":"Crossref","is-referenced-by-count":4,"title":["Industry Perception of Security Challenges with Identity Access Management Solutions"],"prefix":"10.1109","author":[{"given":"Abhishek Pratap","family":"Singh","sequence":"first","affiliation":[{"name":"King&#x0027;s College London,Department of Informatics,London,UK"}]},{"given":"Ievgeniia","family":"Kuzminykh","sequence":"additional","affiliation":[{"name":"King&#x0027;s College London,Department of Informatics,London,UK"}]},{"given":"Bogdan","family":"Ghita","sequence":"additional","affiliation":[{"name":"School of Engineering, Computing and Mathematics University of Plymouth,Plymouth,UK"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Cloud IAM Market","author":"Saha","year":"2022","journal-title":"Future Market Insights report, REP-GB-15034"},{"key":"ref2","article-title":"Cloud Security Report","year":"2023","journal-title":"Cybersecurity Insiders"},{"key":"ref3","article-title":"Cloud Security Report","year":"2022","journal-title":"Cybersecurity Insiders"},{"key":"ref4","volume-title":"Three major identity security failures of the last decade","year":"2024"},{"key":"ref5","article-title":"IAM the one Who Knocks","volume-title":"BlackHat USA","author":"Gofman","year":"2022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2018.05.010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2478\/bsaft-2022-0007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.24018\/ejeng.2023.8.4.3074"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.55621\/idpro.38"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.03.117"},{"issue":"10","key":"ref11","first-page":"I","article-title":"Cloud Identity And Access Management - A Model Proposal","volume":"6","author":"Mohammed","year":"2019","journal-title":"Int. J. Inn Eng Res Tech"},{"issue":"1","key":"ref12","first-page":"1099","article-title":"Data Security in Cloud: A Review","volume":"5","author":"Sandesh","journal-title":"Asian J. Adv in Research"},{"key":"ref13","first-page":"1","article-title":"On-Premises Versus SECaaS Security Models","volume-title":"Proc. ISDFS","author":"PIa"},{"key":"ref14","first-page":"95","article-title":"Identity & Access Management (IAM) and Customer IAM (CIAM): a Pulse Survey of Several Global Corporations Over Their Current Usage and Exploitation of Automated IAM and CIAM Solutions","volume":"7","author":"Liveretos","journal-title":"Int. J. Computers"},{"key":"ref15","article-title":"Navigating the Top 10 Challenges in Cloud Identity and Access Management","author":"Nachmany","year":"2023","journal-title":"IAM Working Group, Cloud Security Alliance"},{"key":"ref16","article-title":"Cloud Migration Optimizes Identity and Access Management","year":"2023","journal-title":"Forrester Consulting report"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1509\/jm.16.0124"},{"key":"ref18","article-title":"Cost ofa Data Breach Report 2023","year":"2023","journal-title":"IBM Security report"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/encyclopedia1030050"},{"key":"ref20","article-title":"Complexity is the enemy of securing identity","year":"2023","journal-title":"State of Multi-Cloud report"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97777-1_5"},{"key":"ref22","article-title":"Identity and Access Management Market Insights, 2022","year":"2023","journal-title":"Forrester Research, Inc."}],"event":{"name":"2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","location":"Tbilisi, Georgia","start":{"date-parts":[[2024,6,24]]},"end":{"date-parts":[[2024,6,27]]}},"container-title":["2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10646183\/10646188\/10646296.pdf?arnumber=10646296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:25:00Z","timestamp":1725517500000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10646296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/blackseacom61746.2024.10646296","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}