IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment
نویسندگان
چکیده
منابع مشابه
Inter-Cloud Architecture and Media Cloud Storage Design Considerations
The rapid increase in digital content, specially multimedia, calls now for standardization of Media Cloud and Inter-Cloud computing, for better provisioning of services. InterCloud computing faces some key challenges in terms of handling multimedia, which are discussed in this paper along with our research status towards their solutions. We also present InterCloud basic architecture and Media C...
متن کاملOptimizing Identity and Access Management (IAM) Frameworks
Organizations in both public and private sectors are realizing the value of identity and access management technology to address mission-critical needs and to ensure appropriate access to resources across heterogeneous technology environments, and to meet rigorous compliance requirements. A well-designed identity management system is fundamental to enabling better information sharing, enhancing...
متن کاملAccess Control in Cloud Computing Environment
Cloud computing is one of the emerging technologies. The cloud environment is a large open distributed system. It is important to preserve the data, as well as, privacy of users. Access Control methods ensure that authorized user’s access the data and the system. This paper discusses various features of attribute based access control mechanism, suitable for cloud computing environment. It leads...
متن کاملA Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System
Cloud computing has drastically condensed the computational and storage costs of outsourced data. The existing access control techniques offer users access provisions centered on the common user attributes like Roles, which reduces the fine-grained access measure. The paper defines a Storage Correctness and Fine-grained Access Provision (SCFAP) scheme, that provides the user an exclusive access...
متن کاملHybrid Intrusion Detection Architecture for Cloud Environment
The Cloud computing system can be easily threatened by various attacks, because most of the cloud computing systems provide service to so many people who are not proven to be trustworthy. Due to their distributed nature, cloud computing environment are easy targets for intruders[1]. Intrusions have been a major problem in terms of computing resources such as grid computing, ubiquitous computing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2016
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2016.26.3.573