Share Email Print

Proceedings Paper

Efficient identity management and access control in cloud environment
Author(s): Jonathan Gloster
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

Paper Details

Date Published: 28 May 2013
PDF: 11 pages
Proc. SPIE 8757, Cyber Sensing 2013, 875709 (28 May 2013); doi: 10.1117/12.2018032
Show Author Affiliations
Jonathan Gloster, Van Dyke Technology Group, Inc. (United States)

Published in SPIE Proceedings Vol. 8757:
Cyber Sensing 2013
Igor V. Ternovskiy; Peter Chin, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?