28 May 2013 Efficient identity management and access control in cloud environment
Author Affiliations +
Abstract
As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jonathan Gloster, Jonathan Gloster, } "Efficient identity management and access control in cloud environment", Proc. SPIE 8757, Cyber Sensing 2013, 875709 (28 May 2013); doi: 10.1117/12.2018032; https://doi.org/10.1117/12.2018032
PROCEEDINGS
11 PAGES


SHARE
Back to Top