An identity management scheme for cloud computing: Review, challenges, and future directions

AM Mostafa, E Rushdy, R Medhat… - Journal of Intelligent & …, 2023 - content.iospress.com
Cloud computing is a cost-effective way for organizations to access and use IT resources.
However, it also exposes data to security threats. Authentication and authorization are …

Identity and access management system: a web-based approach for an enterprise

MK Hamza, H Abubakar, YM Danlami - Traektoriâ Nauki= Path of …, 2018 - cyberleninka.ru
Managing digital identities and access control for enterprise users and applications remains
one of the greatest challenges facing computing today. An attempt to address this issue led …

Identity and access management for cloud services used by the payment card industry

R Schulze - Cloud Computing–CLOUD 2018: 11th International …, 2018 - Springer
Abstract The Payment Card Industry Data Security Standard (PCI DSS) mandates that any
entity of the cardholder data environment (CDE) involved in the credit card payment process …

[引用][C] Challenges of Implementing Cloud Security System Through Identity, Access & Risk Management [IARM] In a Hybrid IT Environment

SSC Aylapuram - Turkish Journal of Computer and Mathematics …, 2022

Securing the digital witness identity using blockchain and zero-knowledge proofs

L Lourinho, S Kendzierskyj, H Jahankhani - … and AI in the Cyber Ecosystem, 2021 - Elsevier
The digital witness concept is underpinned by the Internet of Things (IoT) which brings
serious privacy challenges and concerns. Digital witnesses deliver digital evidence to …

Platforma za transformaciju softverskih rešenja pametnih elektroenergetskih mreža na cloud bazirani višeorganizacijski SaaS

N Dalčeković - 2019 - search.proquest.com
Sve češćom upotrebom cloud okruženja dolazi do potrebe da se postojeća softverska
rešenja migriraju. Metodologija za migraciju na cloud postoji više, gde se u finalnim fazama …

A Novel Approach for User Specified Cryptographic Calculation for Securing Authentication

S Gupta, DP Singh, P Sharma - 2nd International Conference …, 2020 - ieeexplore.ieee.org
Authentication is major among the foremost security criterion whereas subject to key of the
cataloged services to the supposed end user. The participating choices of cloud computing …

[HTML][HTML] Mechanisms and Difficulties for Cloud Computing Information Protection and Access Control

MK Choudhary - tumbe.org
Distributed computation is a dynamic structure that integrates a number of coordinated
computers to serve requested administrations. The distributed computing design consists of …

[PDF][PDF] Un Nouveau Modèle de Gestion Dynamique de la Confiance pour la Fédération des Identités Dans le Cloud Computing

G Bendiab - 2020 - researchgate.net
Résumé Une gestion sécurisée et efficace des identités est l'un des enjeux majeurs du
cloud computing, où des entités appartenant à différents domaines échangent et partagent …

[PDF][PDF] Tumbe Group of International Journals

MK Choudhary - 2021 - tumbe.org
Distributed computation is a dynamic structure that integrates a number of coordinated
computers to serve requested administrations. The distributed computing design consists of …