[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …
supports demanded services. The architecture of cloud computing consists of different kinds …
[PDF][PDF] Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.
Identity management is based on the creation and management of user identities for
granting access to the cloud resources based on the user attributes. The cloud identity and …
granting access to the cloud resources based on the user attributes. The cloud identity and …
Authentication in Cloud Computing: Open Problems
Z Khudoykulov, A Karimov… - … on Electronics and …, 2023 - ieeexplore.ieee.org
An authentication mechanism plays an essential role in access control. Authentication
methods vary depending on the environment used, and many authentication methods are …
methods vary depending on the environment used, and many authentication methods are …
Encrypted token based authentication with adapted SAML technology for cloud web services
Web applications and cloud services are rapidly emerging as the inevitable technology for
communication between organizations. Cloud-based solutions are currently deployed to …
communication between organizations. Cloud-based solutions are currently deployed to …
ACROSS: A generic framework for attribute-based access control with distributed policies for virtual organizations
EF Silva, DC Muchaluat-Saade… - Future Generation …, 2018 - Elsevier
Research interests about access control mechanisms for distributed resources have recently
increased. In this scenario, users from different institutions access distributed resources …
increased. In this scenario, users from different institutions access distributed resources …
ICAuth: A secure and scalable owner delegated inter-cloud authorization
This paper proposes a secure inter-cloud authorization scheme using ciphertext-policy
attribute-based encryption (CP-ABE). The proposed scheme enables data owners to access …
attribute-based encryption (CP-ABE). The proposed scheme enables data owners to access …
Does student proactivity guarantee positive academic results?
This paper analyzes the impact of students' proactivity on academic performance based on a
sample from students enrolled in an introductory course of Political Economy at the …
sample from students enrolled in an introductory course of Political Economy at the …
[PDF][PDF] Defining cloud identity security and privacy issues: A Delphi method
B Cusack, E Ghazizadeh - 2019 - scholar.archive.org
The purpose of this study is to identify the potential security and privacy issues for the
entities providing cloud identity services known as cloud identity providers. We document …
entities providing cloud identity services known as cloud identity providers. We document …
Integrating an AAA‐based federation mechanism for OpenStack—the CLASSe view
A Pérez Méndez, G López Millán… - Concurrency and …, 2017 - Wiley Online Library
Identity federations enable users, service providers, and identity providers from different
organizations to exchange authentication and authorization information in a secure way. In …
organizations to exchange authentication and authorization information in a secure way. In …