[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

[PDF][PDF] Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.

A Alsirhani, M Ezz, AM Mostafa - Computer Systems Science & …, 2022 - cdn.techscience.cn
Identity management is based on the creation and management of user identities for
granting access to the cloud resources based on the user attributes. The cloud identity and …

A JSON token-based authentication and access management schema for cloud SaaS applications

O Ethelbert, FF Moghaddam, P Wieder… - 2017 IEEE 5th …, 2017 - ieeexplore.ieee.org
Cloud computing is significantly reshaping the computing industry built around core
concepts such as virtualization, processing power, connectivity and elasticity to store and …

Integrated identity and access management metamodel and pattern system for secure enterprise architecture

K Nahar, AQ Gill - Data & Knowledge Engineering, 2022 - Elsevier
Identity and access management (IAM) is one of the key components of the secure
enterprise architecture for protecting the digital assets of the information systems. The …

Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing

K Sundar, S Sasikumar, C Jayakumar… - Multimedia Tools and …, 2023 - Springer
In recent days, cloud computing is a universal computing and conventional paradigm, in
which the resources are provided over the Internet based on requirements. With the huge …

Encrypted token based authentication with adapted SAML technology for cloud web services

I Indu, RA PM, V Bhaskar - Journal of Network and Computer Applications, 2017 - Elsevier
Web applications and cloud services are rapidly emerging as the inevitable technology for
communication between organizations. Cloud-based solutions are currently deployed to …

Application model for privileged account access control system in enterprise networks

E Sindiren, B Ciylan - Computers & Security, 2019 - Elsevier
Directory applications are utilized to centrally manage the high number of computers, user
accounts, printers, servers, etc. While using the directory service, privileged accounts are …

[PDF][PDF] Privileged account management approach for preventing insider attacks

E Sindiren, B Ciylan - … Journal of Computer Science and Network …, 2018 - researchgate.net
The companies gradually increase their safety precautions towards protecting their
information systems, but the attackers simultaneously explore many different methods for …

Quantum key distribution and cryptography mechanisms for cloud data security

M Thangapandiyan, PMR Anand… - … on communication and …, 2018 - ieeexplore.ieee.org
Providing security to the Personal Health Record (PHR) stored in cloud is an important and
critical task in recent days. Different cloud security mechanisms are developed in the …

A review towards the development of ontology based identity and access management metamodel

K Nahar, AQ Gill - Web, Artificial Intelligence and Network Applications …, 2020 - Springer
Building an identity and access management (IAM) system that satisfies business needs and
can evolve over time with the ever-changing business environment, is always a challenging …