Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/6233
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Faraj, Sufyan T. | - |
dc.contributor.author | Jassim, Sameeh Abdulghafour | - |
dc.contributor.author | Kifayat, Kashif | - |
dc.date.accessioned | 2022-10-24T19:06:01Z | - |
dc.date.available | 2022-10-24T19:06:01Z | - |
dc.date.issued | 2012 | - |
dc.identifier.issn | 1991-8941 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/6233 | - |
dc.description.abstract | Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources on Internet instead of using software or storage on a local computer. The economic benefits are the main reason for using cloud computing. Cloud computing dynamically delivers everything as a service (XaaS) over the internet based on user demand, such as network, operating system, storage, hardware, software, and resources. Thus, many security and privacy issues must be taken into consideration. The services of cloud computing are usually classified into three types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper aims to achieve two main goals. The first is to review the field of cloud computing with an emphasis on the identity and access management (IAM) in the cloud. Secondly, we will report on our ongoing work for developing a novel system for IAM based on the techniques of Identity-Based Cryptography (IBC) security mediated cryptography. The proposed system architecture will be outlined along with some of the major operational steps | en_US |
dc.language.iso | en | en_US |
dc.publisher | J. of university of anbar for pure science | en_US |
dc.relation.ispartofseries | 6;2 | - |
dc.subject | Access Control | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Identity and access management | en_US |
dc.subject | Security | en_US |
dc.title | Management of Identity and Access in the Cloud | en_US |
dc.type | Article | en_US |
Appears in Collections: | قسم نظم المعلومات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
7a58a011784e1b33.pdf | 549.44 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.