[图书][B] Attribute-based access control models and implementation in cloud infrastructure as a service

X Jin - 2014 - search.proquest.com
Recently, there has been considerable interest in attribute-based access control (ABAC) to
overcome the limitations of the classical access control models (ie, discretionary-DAC …

Role and attribute based collaborative administration of intra-tenant cloud iaas

X Jin, R Krishnan, R Sandhu - 10th IEEE International …, 2014 - ieeexplore.ieee.org
Cloud Infrastructure as a Service (IaaS), where traditional IT infrastructure resources such as
compute, storage and networking are owned by a cloud service provider (CSP) and offered …

Two factor authentication using M-pin server for secure cloud computing environment

N Nagar, U Suman - Web-Based Services: Concepts, Methodologies …, 2016 - igi-global.com
Cloud computing is comprised of major demand from the every group of organization
because of easy availability and cost effectiveness. The responsibilities of cloud service …

User-centric trust based identity as a service for federated cloud environment

E Samlinson, M Usha - 2013 Fourth International Conference …, 2013 - ieeexplore.ieee.org
Cloud computing is the promising model of delivering IT resources on demand. Identity and
Access Management (IAM) stands as the hurdle for enterprises to adopt to cloud. This paper …

The Vital Role of Cloud Healthcare During COVID-19 Pandemic

A Adnan - Journal La Multiapp, 2022 - newinera.com
The most sharable tag on social media was “stay at home”. Where, the governments oblige
their residents from physical meeting or traveling instead of this they have to stay at their …

[PDF][PDF] Defining cloud identity security and privacy issues: A Delphi method

B Cusack, E Ghazizadeh - 2019 - scholar.archive.org
The purpose of this study is to identify the potential security and privacy issues for the
entities providing cloud identity services known as cloud identity providers. We document …

Integrating cloud platforms to identity federations

IS Sette, CAG Ferraz - 2014 Brazilian Symposium on Computer …, 2014 - ieeexplore.ieee.org
Privacy of the data processed and/or stored in the cloud is a concern for the users of these
services. Cloud platforms are exposed in the Internet, managed by third parties, and their …

Secured Identity and Access Management for Cloud Computing Using Zero Trust Architecture

V Yadav, MK Soni, A Pratap - … on Cryptology & Network Security with …, 2023 - Springer
Cloud computing environment combines a variety of networked devices to facilitate the
provision of requested services. 8–9% challenges related to cloud are due to identity and …

Cloud computing infrastructure for massive data: a gigantic task ahead

R Vashist - Big Data in Complex Systems: Challenges and …, 2015 - Springer
Today, in the era of computer we collect and store data from innumerable sources and some
of these are Internet transactions, social media, mobile devices and automated sensors …

[PDF][PDF] A distributed key based security framework for private clouds

A Shahbazi, J Brinkley, A Karahroudy… - International Journal of …, 2013 - Citeseer
Cloud computing in its various forms continues to grow in popularity as organizations of all
sizes seek to capitalize on the cloud's scalability, externalization of infrastructure and …