Cloud identity management security issues & solutions: a taxonomy
نویسندگان
چکیده
منابع مشابه
Cloud identity management security issues & solutions: a taxonomy
*Correspondence: [email protected]; [email protected] 1Department of Computing, School of Electrical Engineering & Computer Science, National University of Sciences & Technology (NUST), Sector H-12, Islamabad, Pakistan Full list of author information is available at the end of the article Abstract Purpose: Cloud computing systems represent one of the most complex computing system...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملIdentity Management issues in Cloud Computing
Cloud computing is providing a low cost on demand services to the users, omnipresent network, large storage capacity due to these features of cloud computing web applications are moving towards the cloud and due to this migration of the web application, cloud computing platform is raised many issues like privacy, security etc. Privacy issue are major concern for the cloud computing. Privacy is ...
متن کاملA Taxonomy of Data Management Issues in Mobile Cloud Computing
Cloud computing can greatly boost the computing ability of mobile devices. Mobile users can rely on the cloud to perform computationally rigorous operations such as data mining searching and multimedia processing. Even with increasing usage of mobile computing, it is difficult to exploit its ability due to its inherent tribulations such as frequent disconnections, resource insufficiency and mob...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Complex Adaptive Systems Modeling
سال: 2014
ISSN: 2194-3206
DOI: 10.1186/s40294-014-0005-9