A Federation of Federations: Secure Cloud Federations meet European Identity Federations
نویسندگان
چکیده
منابع مشابه
Towards Secure XML Federations
The integration of isolated XML repositories has drawn more and more interest recently. In this paper, we propose XML federations to provide global e-services while preserving the necessary autonomy and security of each individual repository. First we show a logical architecture of XML federations, which is adapted from the common architecture of traditional federated databases according to the...
متن کاملCloud Federations in Contrail
Cloud computing infrastructures support dynamical and flexible access to computational, network and storage resources. To date, several disjoint industrial and academic technologies provide infrastructure level access to Clouds. Especially for industrial platforms, the evolution of de-facto standards goes together with worries about user lock-in to a platform. The Contrail project [6] proposes ...
متن کاملA Multidimensional Reputation Scheme for Identity Federations
Deciding who to trust in the internet of services paradigm is an important and open question. How to do it in an optimal way is not always easy to determine. Trust is usually referred to a particular context, and sometimes a single user interacts in more than one given context. We are interested in investigating how a Federated Reputation System can help exporting trust perceptions from one con...
متن کاملStandards for enabling heterogeneous IaaS cloud federations
As different Cloud Management Frameworks and resource providers are settling in the market there is the need to grasp the interoperability problems present in current infrastructures, and study how existing and emerging standards could enhance user experience in the cloud ecosystem. In this paper we will review the current open challenges in Infrastructure as a Service cloud interoperability an...
متن کاملBuilding Software Federations
Components Of The Shelf tools (COTS) are now widely distributed, of good quality, relatively cheap and cover most of the application domains. It is thus a surprise to consider that it is uncommon to reuse COTS when building large applications. At least it is recognized that building a large application based on COTS is a tough issue. This paper seeks to show why it is difficult; it is argued th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Information Security Research
سال: 2018
ISSN: 2042-4639
DOI: 10.20533/ijisr.2042.4639.2018.0089