R Bhandari, U Bhoi, D Patel - International Journal of Computer …, 2013 - Citeseer
Cloud computing is a new trend of computing paradigm that provides a set of scalable resources on demand. However, it also being a target of cyber attacks and creates risk for …
K Gunjan, G Sahoo, RK Tiwari - International Journal of Engineering …, 2012 - academia.edu
The Cloud computing paradigm has gained much popularity these days because of its ability to provide highly scalable resources at cheap rates. However, the concern for security …
G Rastogi, R Sushil - Int. Conf. Cloud Comput. Big Data, 2016 - researchgate.net
Identity Management (IDM) is one of the most important concerns of today's technology- centric world as it is a key for access control and authentication. IDM has become a very …
A Gopalakrishnan - SETLabs briefings, 2009 - basconsulting.in
Latest technology facilitates different service providers to unite their efforts to address a broader business space. It is possible that consumers hold multiple accounts with the …
D Daniels - J-Gate Acad. J. Database, 2013 - academia.edu
This paper reviews both scholarly and trade literature for contribution into a greater body of knowledge in identity management (IdM) practices and applications in cloud infrastructures …
Cloud computing technologies have been rapidly adopted by organizations to lower costs and to enable flexible and efficient access to critical data. As these new cloud technologies …
K Raghavendra, B Ramesh - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
The role of cloud computing in today's world of globalization has seen major contribution for application development and deployment. Many enterprise see cloud computing as a …
Cloud computing is a dynamic paradigm based on sound technology aimed at supporting IT users in essential computing task. Cloud providers offer services that can be used to carry …
A Benusi - International Journal of Computing and Optimization, 2014 - m-hikari.com
Identity Management has become a very important topic in the cloud computing environments, where cloud providers need to control usernames, passwords and other …