Building the Infrastructure for Cloud Security 2014
DOI: 10.1007/978-1-4302-6146-9_7
|View full text |Cite
|
Sign up to set email alerts
|

Identity Management and Control for Clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Along with the schemes developed in the authentication security layer, other protection mechanisms and practices in preventing unauthorized access to system and data resources can be implemented, including mandatory access control (MAC), discretionary access control (DAC), rule-based access control, physical access control, role-based access control, attribute-based access control, and policy-based access control, which are beyond the scope of this book chapter to discuss. However, the functionality and effectiveness of each approach are highly dependent on data regulations established by the organization [43,47].…”
Section: Planning Risk Responsementioning
confidence: 99%
“…Along with the schemes developed in the authentication security layer, other protection mechanisms and practices in preventing unauthorized access to system and data resources can be implemented, including mandatory access control (MAC), discretionary access control (DAC), rule-based access control, physical access control, role-based access control, attribute-based access control, and policy-based access control, which are beyond the scope of this book chapter to discuss. However, the functionality and effectiveness of each approach are highly dependent on data regulations established by the organization [43,47].…”
Section: Planning Risk Responsementioning
confidence: 99%
“…Theoretically, an entity can have several different identity attributes [3]- [5]. IdM processes encompass the management of the entity identities and their authentication, authorization, roles, and privileges and permissions within or across system and enterprise boundaries [6]. IdMs aim to assure that the service provider (SP) will offer services to a trusted requester based on a pre-established trust relationship with the identity provider IdP to increase enterprises security and productivity.…”
Section: Introductionmentioning
confidence: 99%