Cloud Identity and Access Management – A Model Proposal

@inproceedings{Mangiuc2012CloudIA,
  title={Cloud Identity and Access Management – A Model Proposal},
  author={Dragos Marian Mangiuc},
  year={2012}
}
Even if in a typical organization, where applications are deployed within the organization’s perimeter, the “trust boundary” is mostly static and is monitored and controlled by the IT department; with the adoption of cloud services, the organization’s trust boundary will become dynamic and will move beyond the control of IT. With cloud computing, the network, system, and application boundary of an organization will extend into the service provider domain. This loss of control continues to… CONTINUE READING

Figures and Tables from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 13 REFERENCES

Google Embraces OAuth Authentication

T. Rosini
  • “Newspeople”, Editor & Publisher,
  • 2010
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

“ Google Embraces OAuth Authentication For Apps ”

M. J. Schwartz
  • Informationweek
  • 2010
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Secure Identities

  • IEEE Internet Computing
  • 2011
VIEW 1 EXCERPT

“ XACML - Based Directory Server ”

D. Kearns
  • Network World
  • 2011
VIEW 1 EXCERPT

OAuth is the 'Hottest Thing' in Identity Management

P. J. Connolly
  • 2010
VIEW 1 EXCERPT

“ Identity Theft ”

K. B. Anderson, E. Durbin, M. A. Salinger
  • The Journal of Economic Perspectives
  • 2008
VIEW 1 EXCERPT

“ OpenID Single Sign - On ”

J. Weiskotten
  • Dr . Dobb ' s Journal
  • 2008
VIEW 1 EXCERPT

“ The ' identity as a service ' controversy : * Using the phrase ' identity as a service ( IaaS ) ' legally ”

D. Kearns
  • Network World
  • 2008
VIEW 1 EXCERPT