{"id":"https://openalex.org/W2042288050","doi":"https://doi.org/10.1145/1292491.1292506","title":"Identity and access management for the distribution of social grants in South Africa","display_name":"Identity and access management for the distribution of social grants in South Africa","publication_year":2007,"publication_date":"2007-10-02","ids":{"openalex":"https://openalex.org/W2042288050","doi":"https://doi.org/10.1145/1292491.1292506","mag":"2042288050"},"language":"en","primary_location":{"id":"doi:10.1145/1292491.1292506","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1292491.1292506","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080960461","display_name":"Gideon Ranga","orcid":null},"institutions":[{"id":"https://openalex.org/I114499477","display_name":"University of Fort Hare","ror":"https://ror.org/0184vwv17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I114499477"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Gideon Ranga","raw_affiliation_strings":["University of Fort Hare, East London, South Africa"],"affiliations":[{"raw_affiliation_string":"University of Fort Hare, East London, South Africa","institution_ids":["https://openalex.org/I114499477"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068156128","display_name":"Stephen Flowerday","orcid":"https://orcid.org/0000-0002-4591-3802"},"institutions":[{"id":"https://openalex.org/I114499477","display_name":"University of Fort Hare","ror":"https://ror.org/0184vwv17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I114499477"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Stephen Flowerday","raw_affiliation_strings":["University of Fort Hare, East London, South Africa"],"affiliations":[{"raw_affiliation_string":"University of Fort Hare, East London, South Africa","institution_ids":["https://openalex.org/I114499477"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080960461"],"corresponding_institution_ids":["https://openalex.org/I114499477"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.11044174,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"125","last_page":"131"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14431","display_name":"Diverse Research and Applications","score":0.9643999934196472,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14431","display_name":"Diverse Research and Applications","score":0.9643999934196472,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.8623876571655273},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6374714374542236},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6152149438858032},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5775807499885559},{"id":"https://openalex.org/keywords/access-management","display_name":"Access management","score":0.5370527505874634},{"id":"https://openalex.org/keywords/institution","display_name":"Institution","score":0.5363902449607849},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5214749574661255},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5179292559623718},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5162834525108337},{"id":"https://openalex.org/keywords/agency","display_name":"Agency (philosophy)","score":0.4948703646659851},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4680319130420685},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4408488869667053},{"id":"https://openalex.org/keywords/distribution","display_name":"Distribution (mathematics)","score":0.4375859797000885},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.4326321482658386},{"id":"https://openalex.org/keywords/single-sign-on","display_name":"Single sign-on","score":0.43232107162475586},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.375969797372818},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2842906713485718},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.1790773868560791},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11990892887115479},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.11031153798103333}],"concepts":[{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.8623876571655273},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6374714374542236},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6152149438858032},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5775807499885559},{"id":"https://openalex.org/C2778002324","wikidata":"https://www.wikidata.org/wiki/Q4488810","display_name":"Access management","level":2,"score":0.5370527505874634},{"id":"https://openalex.org/C2780510313","wikidata":"https://www.wikidata.org/wiki/Q178706","display_name":"Institution","level":2,"score":0.5363902449607849},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5214749574661255},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5179292559623718},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5162834525108337},{"id":"https://openalex.org/C108170787","wikidata":"https://www.wikidata.org/wiki/Q3951828","display_name":"Agency (philosophy)","level":2,"score":0.4948703646659851},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4680319130420685},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4408488869667053},{"id":"https://openalex.org/C110121322","wikidata":"https://www.wikidata.org/wiki/Q865811","display_name":"Distribution (mathematics)","level":2,"score":0.4375859797000885},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.4326321482658386},{"id":"https://openalex.org/C2776362682","wikidata":"https://www.wikidata.org/wiki/Q568494","display_name":"Single sign-on","level":3,"score":0.43232107162475586},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.375969797372818},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2842906713485718},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.1790773868560791},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11990892887115479},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.11031153798103333},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1292491.1292506","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1292491.1292506","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.4300000071525574,"display_name":"Reduced inequalities"},{"id":"https://metadata.un.org/sdg/16","score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W649953152","https://openalex.org/W1505999675","https://openalex.org/W1608170983","https://openalex.org/W1968554315","https://openalex.org/W2028136508","https://openalex.org/W2124334240","https://openalex.org/W2140695212","https://openalex.org/W2323537747"],"related_works":["https://openalex.org/W2005308538","https://openalex.org/W2245771844","https://openalex.org/W4391222116","https://openalex.org/W1971172603","https://openalex.org/W2370296220","https://openalex.org/W3046004933","https://openalex.org/W2213995339","https://openalex.org/W4301417531","https://openalex.org/W2296702370","https://openalex.org/W1989467534"],"abstract_inverted_index":{"Identity":[0],"and":[1,11,23,39,89,96,133],"Access":[2],"Management":[3],"(IAM)":[4],"is":[5,70],"an":[6,18],"emerging":[7],"solution":[8,99],"for":[9,30,72,121],"authenticating":[10],"authorising":[12],"individuals.":[13],"This":[14,80],"begins":[15],"with":[16],"determining":[17],"individual's":[19],"'identity'":[20],"through":[21],"identification":[22],"verification":[24],"processes.":[25,143],"Then":[26],"it":[27],"becomes":[28],"vital":[29],"every":[31],"organisation":[32],"or":[33],"institution":[34],"to":[35,40,43,47,55,77,100,128],"authenticate":[36],"these":[37,105],"individuals":[38],"authorise":[41],"access":[42],"resources":[44],"in":[45,92],"addition":[46],"limiting":[48],"risks.":[49],"An":[50,107],"empirical":[51],"study":[52,114],"was":[53,115],"undertaken":[54],"elicit":[56],"IAM":[57,94,117],"challenges":[58],"that":[59,116],"occur":[60],"within":[61],"the":[62,73,83,93,119,122,141],"South":[63],"African":[64],"Social":[65],"Security":[66],"Agency":[67],"(SASSA),":[68],"which":[69],"responsible":[71],"distribution":[74],"of":[75,104,124,131],"grants":[76],"underprivileged":[78],"citizens.":[79],"paper":[81],"presents":[82],"problems":[84],"being":[85],"experienced":[86],"by":[87],"SASSA":[88],"its":[90],"stakeholders":[91],"domain":[95],"a":[97,102],"possible":[98],"resolve":[101],"few":[103],"problems.":[106],"important":[108],"point":[109],"noted":[110],"during":[111],"this":[112],"case":[113],"increases":[118],"need":[120],"federation":[123],"databases":[125],"so":[126],"as":[127,137,139],"ensure":[129],"ease":[130],"use":[132],"single":[134],"sign-on":[135],"(SSO),":[136],"well":[138],"improving":[140],"security":[142]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
