
Proceedings Paper
Efficient identity management and access control in cloud environmentFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce
operating costs by exploiting shared resources, concerns have risen over the ability to secure information
within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can
be adapted to address security concerns of a cloud environment. We propose changing the paradigm of
IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud
environment without impacting efficiencies of cloud environments.
Paper Details
Date Published: 28 May 2013
PDF: 11 pages
Proc. SPIE 8757, Cyber Sensing 2013, 875709 (28 May 2013); doi: 10.1117/12.2018032
Published in SPIE Proceedings Vol. 8757:
Cyber Sensing 2013
Igor V. Ternovskiy; Peter Chin, Editor(s)
PDF: 11 pages
Proc. SPIE 8757, Cyber Sensing 2013, 875709 (28 May 2013); doi: 10.1117/12.2018032
Show Author Affiliations
Jonathan Gloster, Van Dyke Technology Group, Inc. (United States)
Published in SPIE Proceedings Vol. 8757:
Cyber Sensing 2013
Igor V. Ternovskiy; Peter Chin, Editor(s)
© SPIE. Terms of Use
