An Intrusion Tolerant Identity Management Infrastructure for Cloud Computing Services

  title={An Intrusion Tolerant Identity Management Infrastructure for Cloud Computing Services},
  author={Luciano Barreto and Frank Siqueira and Joni da Silva Fraga and Eduardo Feitosa},
  journal={2013 IEEE 20th International Conference on Web Services},
Identity management is a central point to the security of large applications such cloud services. The identity providers (IdPs) offer services that handle critical information of users. Usually, this kind of information is stored with special care in these providers and intrusions do not necessarily result in security violations. But intrusions may implant malicious behaviors which modify the action of these authentication services. In this way, unauthorized accesses may be achieved for denying… CONTINUE READING


Publications citing this paper.


Publications referenced by this paper.

Authentication 2.0 - new opportunities for online identification.

  • J. A. Lewis
  • Technical report, Center for Strategic and…
  • 2008
Highly Influential
6 Excerpts

Federation Between CLEVER Clouds Through SASL/Shibboleth Authentication

  • F. Tusa, A. Celesti, M. Villari, A. Puliafito
  • The Fourth International Conference on Evolving…
  • 2012
1 Excerpt

The Contrail approach to cloud federations.

  • M. Coppola, P. Dazzi, A Lazouski
  • The Internation Symposium on Grids and Clouds…
  • 2012
1 Excerpt

Similar Papers

Loading similar papers…