Information Technology Reference
In-Depth Information
References
1. Jøsang, A., Fabre, J., Hay, B., Dalziel, J., Pope, S.: Trust requirements in identity man-
agement. In: Proceedings of the 2005 Australasian Workshop on Grid Computing and
e-research, vol. 44, pp. 99-108. Australian Computer Society, Inc. (2005)
2. Habiba, U., Ghafoor, A., Masood, R., Shibli, M.A.: Assessment criteria for cloud identity
management systems. In: 19th IEEE Pacific Rim International Symposium on Depend-
able Computing (PRDC 2013). IEEE (2014)
3. Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin,
A., Stoica, I.: Above the clouds: A berkeley view of cloud computing. Dept. Electrical
Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB/EECS, vol. 28
(2009)
4. Ghazizadeh, E., Zamani, M., Ab Manan, J.-L., Pashang, A.: A survey on security issues
of federated identity in the cloud computing. In: 2012 IEEE 4th International Conference
on Cloud Computing Technology and Science (CloudCom), pp. 532-565. IEEE (2012)
5. Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Ben Othmane, L., Lilien,
L.: An entity-centric approach for privacy and identity management in cloud computing.
In: 2010 29th IEEE Symposium on Reliable Distributed Systems, pp. 177-183. IEEE
(2010)
6. Sanchez, R., Almenares, F., Arias, P., Diaz-Sanchez, D., Marın, A.: Enhancing privacy
and dynamic federation in idm for consumer cloud computing. IEEE Transactions on
Consumer Electronics 58(1), 95-103 (2012)
7. Shamoon, I., Rajpoot, Q., Shibli, A.: Policy conflict management using xacml. In: 2012
8th International Conference on Computing and Networking Technology (ICCNT), pp.
287-291 (August 2012)
8. Celesti, A., Tusa, F., Villari, M., Puliafito, A.: Security and cloud computing: intercloud
identity management infrastructure. In: 2010 19th IEEE International Workshop on En-
abling Technologies: Infrastructures for Collaborative Enterprises (WETICE), pp. 263-
265. IEEE (2010)
9. Yan, L., Rong, C., Zhao, G.: Strengthen cloud computing security with federal identity
management using hierarchical identity-based cryptography. In: Jaatun, M.G., Zhao, G.,
Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 167-177. Springer, Heidelberg
(2009)
10. Chadwick, D.W., Casenove, M.: Security apis for my private cloud-granting access to
anyone, from anywhere at any time. In: 2011 IEEE Third International Conference on
Cloud Computing Technology and Science (CloudCom), pp. 792-798. IEEE (2011)
11. Kim, I.K., Pervez, Z., Khattak, A.M., Lee, S.: Chord based identity management for
e-healthcare cloud applications. In: 2010 10th IEEE/IPSJ International Symposium on
Applications and the Internet (SAINT), pp. 391-394. IEEE (2010)
12. Kumaraswamy, S., Lakshminarayanan, S., Stein, M.R.J., Wilson, Y.: Domain 12:
Guidance for identity & access management v2. 1. Cloud Security Alliance 10 (2010),
http://www.cloudsecurityalliance.org/guidance/
csaguide-dom12-v2
13. Hitachi id identity manager (January 2014),
http://hitachi-id.com/identity-manager/ (accessed August 28, 2013)
14. Identity manager 4 standard edition, https://www.netiq.com/products/
identity-manager/standard/features/ (accessed August 2013)
Search WWH ::




Custom Search