منابع مشابه
Optimizing Identity and Access Management (IAM) Frameworks
Organizations in both public and private sectors are realizing the value of identity and access management technology to address mission-critical needs and to ensure appropriate access to resources across heterogeneous technology environments, and to meet rigorous compliance requirements. A well-designed identity management system is fundamental to enabling better information sharing, enhancing...
متن کاملIdentity Management in Cloud Computing
Cloud computing offers a rich set of services by pay per use basis. The features and technology offered by various providers created a great competitive market for the business. The various security issues are attracting attention, one of which is identity and privacy of the cloud user. Users are varied about the privacy of information which they have given to the provider at the time of regist...
متن کاملPrivacy in Cloud Computing Through Identity Management
The migration of web applications to Cloud computing platform has raised concerns about the privacy of sensitive data belonging to the consumers of cloud services. The traditional form of security tokens like username/password used to access cloud services are prone to phishing attacks and hence do not provide complete security. In this work we propose to extend the Microsoft’s CardSpace identi...
متن کاملIdentity Management issues in Cloud Computing
Cloud computing is providing a low cost on demand services to the users, omnipresent network, large storage capacity due to these features of cloud computing web applications are moving towards the cloud and due to this migration of the web application, cloud computing platform is raised many issues like privacy, security etc. Privacy issue are major concern for the cloud computing. Privacy is ...
متن کاملPrivacy-preserving Digital Identity Management for Cloud Computing
Digital identity management services are crucial in cloud computing infrastructures to authenticate users and to support flexible access control to services, based on user identity properties (also called attributes) and past interaction histories. Such services should preserve the privacy of users, while at the same time enhancing interoperability across multiple domains and simplifying manage...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/14501-2310