[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

[PDF][PDF] Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.

A Alsirhani, M Ezz, AM Mostafa - Computer Systems Science & …, 2022 - cdn.techscience.cn
Identity management is based on the creation and management of user identities for
granting access to the cloud resources based on the user attributes. The cloud identity and …

Authentication in Cloud Computing: Open Problems

Z Khudoykulov, A Karimov… - … on Electronics and …, 2023 - ieeexplore.ieee.org
An authentication mechanism plays an essential role in access control. Authentication
methods vary depending on the environment used, and many authentication methods are …

Encrypted token based authentication with adapted SAML technology for cloud web services

I Indu, RA PM, V Bhaskar - Journal of Network and Computer Applications, 2017 - Elsevier
Web applications and cloud services are rapidly emerging as the inevitable technology for
communication between organizations. Cloud-based solutions are currently deployed to …

ACROSS: A generic framework for attribute-based access control with distributed policies for virtual organizations

EF Silva, DC Muchaluat-Saade… - Future Generation …, 2018 - Elsevier
Research interests about access control mechanisms for distributed resources have recently
increased. In this scenario, users from different institutions access distributed resources …

ICAuth: A secure and scalable owner delegated inter-cloud authorization

NH Sultan, FA Barbhuiya, M Laurent - Future Generation Computer …, 2018 - Elsevier
This paper proposes a secure inter-cloud authorization scheme using ciphertext-policy
attribute-based encryption (CP-ABE). The proposed scheme enables data owners to access …

Does student proactivity guarantee positive academic results?

JM Cansino, R Román, A Expósito - Education sciences, 2018 - mdpi.com
This paper analyzes the impact of students' proactivity on academic performance based on a
sample from students enrolled in an introductory course of Political Economy at the …

[PDF][PDF] Defining cloud identity security and privacy issues: A Delphi method

B Cusack, E Ghazizadeh - 2019 - scholar.archive.org
The purpose of this study is to identify the potential security and privacy issues for the
entities providing cloud identity services known as cloud identity providers. We document …

Integrating an AAA‐based federation mechanism for OpenStack—the CLASSe view

A Pérez Méndez, G López Millán… - Concurrency and …, 2017 - Wiley Online Library
Identity federations enable users, service providers, and identity providers from different
organizations to exchange authentication and authorization information in a secure way. In …

[引用][C] 大数据安全保护技术

陈兴蜀, 杨露, 罗永刚 - 2017 - 工程科学与技术