28 May 2013 Efficient identity management and access control in cloud environment
Author Affiliations +
Abstract
As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jonathan Gloster, Jonathan Gloster, "Efficient identity management and access control in cloud environment", Proc. SPIE 8757, Cyber Sensing 2013, 875709 (28 May 2013); doi: 10.1117/12.2018032; https://doi.org/10.1117/12.2018032
PROCEEDINGS
11 PAGES


SHARE
Back to Top