An Intrusion Tolerant Identity Management Infrastructure for Cloud Computing Services

@article{Barreto2013AnIT,
  title={An Intrusion Tolerant Identity Management Infrastructure for Cloud Computing Services},
  author={Luciano Barreto and Frank Siqueira and Joni da Silva Fraga and Eduardo Feitosa},
  journal={2013 IEEE 20th International Conference on Web Services},
  year={2013},
  pages={155-162}
}
Identity management is a central point to the security of large applications such cloud services. The identity providers (IdPs) offer services that handle critical information of users. Usually, this kind of information is stored with special care in these providers and intrusions do not necessarily result in security violations. But intrusions may implant malicious behaviors which modify the action of these authentication services. In this way, unauthorized accesses may be achieved for denying… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 11 REFERENCES

Authentication 2.0 - new opportunities for online identification.

  • J. A. Lewis
  • Technical report, Center for Strategic and…
  • 2008
Highly Influential
6 Excerpts

Federation Between CLEVER Clouds Through SASL/Shibboleth Authentication

  • F. Tusa, A. Celesti, M. Villari, A. Puliafito
  • The Fourth International Conference on Evolving…
  • 2012
1 Excerpt

The Contrail approach to cloud federations.

  • M. Coppola, P. Dazzi, A Lazouski
  • The Internation Symposium on Grids and Clouds…
  • 2012
1 Excerpt

Similar Papers

Loading similar papers…