WiP: A novel blockchain-based trust model for cloud identity management

K Bendiab, N Kolokotronis, S Shiaeles… - 2018 IEEE 16th Intl …, 2018 - ieeexplore.ieee.org
Secure and reliable management of identities has become one of the greatest challenges
facing cloud computing today, mainly due to the huge number of new cloud-based …

Connecting self-sovereign identity with federated and user-centric identities via SAML integration

H Yildiz, C Ritter, LT Nguyen, B Frech… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Self-sovereign identity provides a feasible alternative to login via username and password
through an identity provider to access digital services. It allows identity subjects to control …

Key challenges and opportunities in cloud computing and implications on service requirements: Evidence from a systematic literature review

Y Benslimane, M Plaisent, P Bernard… - 2014 IEEE 6th …, 2014 - ieeexplore.ieee.org
Based on the findings from a systematic literature review (SLR), this paper presents a
ranking of the key challenges and opportunities for cloud computing services and derives …

Security evaluation of the OAuth 2.0 framework

E Ferry, JO Raw, K Curran - Information & Computer Security, 2015 - emerald.com
Purpose–The interoperability of cloud data between web applications and mobile devices
has vastly improved over recent years. The popularity of social media, smartphones and …

Modeling security requirements for cloud‐based system development

M Ficco, F Palmieri, A Castiglione - … and Computation: Practice …, 2015 - Wiley Online Library
Summary The Cloud Computing paradigm provides a new model for the more flexible
utilization of computing and storage services. However, such enhanced flexibility, which …

Identity management and authentication system for resource access

X Si, WF Liu, P Nyfelt - US Patent 9,467,457, 2016 - Google Patents
A system that authorizes access to a resource by a client validates the client and generates
a Security Assertion Markup Language (“SAML”) assertion for the valid client. The system …

The review of non-technical assumptions in digital identity architectures

A Bazarhanova, K Smolander - 2020 - aisel.aisnet.org
The literature on digital identity management systems (IdM) is abundant and solutions vary
by technology components and non-technical requirements. In the long run, however, there …

[图书][B] Security and Privacy Trends in Cloud Computing and Big Data

MI Tariq, VE Balas, S Tayyaba - 2022 - books.google.com
It is essential for an organization to know before involving themselves in cloud computing
and big data, what are the key security requirements for applications and data processing …

A privacy preserving identification protocol for smart contracts

F Bruschi, T Paulon, V Rana… - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
If on one hand the possibility of using pseudonymous identities is an important feature of
blockchains and smart contracts, on the other hand official identity can be required in some …

Double-Blind Proof of Existence for Decentralized Identities

J Alupotha - IEEE Access, 2023 - ieeexplore.ieee.org
Decentralized identities return control of identities to the identity owners. Although current
work enhances the privacy of these publicly stored identities using encryption and zero …