IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Inter-Cloud Architecture and Media Cloud Storage Design Considerations

The rapid increase in digital content, specially multimedia, calls now for standardization of Media Cloud and Inter-Cloud computing, for better provisioning of services. InterCloud computing faces some key challenges in terms of handling multimedia, which are discussed in this paper along with our research status towards their solutions. We also present InterCloud basic architecture and Media C...

متن کامل

Optimizing Identity and Access Management (IAM) Frameworks

Organizations in both public and private sectors are realizing the value of identity and access management technology to address mission-critical needs and to ensure appropriate access to resources across heterogeneous technology environments, and to meet rigorous compliance requirements. A well-designed identity management system is fundamental to enabling better information sharing, enhancing...

متن کامل

Access Control in Cloud Computing Environment

Cloud computing is one of the emerging technologies. The cloud environment is a large open distributed system. It is important to preserve the data, as well as, privacy of users. Access Control methods ensure that authorized user’s access the data and the system. This paper discusses various features of attribute based access control mechanism, suitable for cloud computing environment. It leads...

متن کامل

A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System

Cloud computing has drastically condensed the computational and storage costs of outsourced data. The existing access control techniques offer users access provisions centered on the common user attributes like Roles, which reduces the fine-grained access measure. The paper defines a Storage Correctness and Fine-grained Access Provision (SCFAP) scheme, that provides the user an exclusive access...

متن کامل

Hybrid Intrusion Detection Architecture for Cloud Environment

The Cloud computing system can be easily threatened by various attacks, because most of the cloud computing systems provide service to so many people who are not proven to be trustworthy. Due to their distributed nature, cloud computing environment are easy targets for intruders[1]. Intrusions have been a major problem in terms of computing resources such as grid computing, ubiquitous computing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology

سال: 2016

ISSN: 1598-3986

DOI: 10.13089/jkiisc.2016.26.3.573