DSpace Repository

Transitioning corporate cybersecurity: An analysis of Decentralized Identity and Access Management (DIAM)

Show simple item record

dc.contributor.advisor ALEXEI, Arina
dc.contributor.author BÎSTRIȚCHI, Ștefan
dc.contributor.author MANOLE, Adrian
dc.date.accessioned 2026-01-13T18:24:22Z
dc.date.available 2026-01-13T18:24:22Z
dc.date.issued 2026
dc.identifier.citation BÎSTRIȚCHI, Ștefan and Adrian MANOLE. Transitioning corporate cybersecurity: An analysis of Decentralized Identity and Access Management (DIAM). In: Conferenţa Tehnico-Ştiinţifică a Colaboratorilor, Doctoranzilor şi Studenţilor = The Technical Scientific Conference of Undergraduate, Master and PhD Students, 14-16 Mai 2025. Universitatea Tehnică a Moldovei. Chişinău: Tehnica-UTM, 2026, vol. 1, pp. 490-493. ISBN 978-9975-64-612-3, ISBN 978-9975-64-613-0 (PDF). en_US
dc.identifier.isbn 978-9975-64-612-3
dc.identifier.isbn 978-9975-64-613-0
dc.identifier.uri https://repository.utm.md/handle/5014/34324
dc.description.abstract Classic Identity Access Management (IAM) schemes come along with a host of vulnerabilities, such as single points of vulnerability and susceptibility to credentials thefts. In this paper, we analyze Decentralized Identity and Access Management (DIAM) as a potential alternative to legacy IAM in business environments. DIAM utilizes Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs), allowing workers to autonomously manage their digital identity credentials. A comparison was made between centralized IAM and DIAM based on underlying technologies, security implications, and real-world implementation issues in a business environment. Our analysis suggests that although DIAM might eliminate some risks present in centralized schemes, such as rampant credentials compromise, simultaneously, it poses unique security risks, specifically about compromising individual cryptographic keys, along with certificate issuers' reliability. The requirement of secure, user-friendly key management tools for workers turns into a significant challenge. The integration of DIAM into business schemes, affording optimal system operation, along with a strong establishment of governing structures, are prerequisites to its successful implementation. These are specifically identified in this work, along with practical solutions needed to overcome these, thus offering a realistic analysis of DIAM’s potential to improve enterprise-level cybersecurity in terms of more than theoretical advantages. en_US
dc.language.iso en en_US
dc.publisher Universitatea Tehnică a Moldovei en_US
dc.relation.ispartofseries Conferinţa tehnico-ştiinţifică a studenţilor, masteranzilor şi doctoranzilor = The Technical Scientific Conference of Undergraduate, Master and PhD Students: 14-16 mai 2025;
dc.rights Attribution-NonCommercial-NoDerivs 3.0 United States *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/3.0/us/ *
dc.subject decentralized identity en_US
dc.subject verifiable credentials en_US
dc.subject identity management en_US
dc.subject cybersecurity en_US
dc.subject key management en_US
dc.subject enterprise security en_US
dc.title Transitioning corporate cybersecurity: An analysis of Decentralized Identity and Access Management (DIAM) en_US
dc.type Article en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States

Search DSpace


Advanced Search

Browse

My Account