An overview of cloud identity management-models

23Citations
Citations of this article
88Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Unique identification and secure authentication are essential processes in various areas of application, e.g. in e-Government, e-Health, or e-Business. During the past years several identity management-systems and models have evolved. Many organizations and enterprises or even countries for their national eID solutions rely on identity management-systems for securing their applications. Since more and more applications are migrated into the cloud, secure identification and authentication are also vital in the cloud domain. However, cloud identity management-systems need to meet slightly different requirements than traditional identity management-systems and thus cannot be clustered into the same model types or categories. Therefore, in this paper we give an overview of different cloud identity management-models that have already emerged up to now. We further compare these models based on selected criteria, e.g. on practicability and privacy aspects. Copyright © 2014 SCITEPRESS.

Cite

CITATION STYLE

APA

Zwattendorfer, B., Zefferer, T., & Stranacher, K. (2014). An overview of cloud identity management-models. WEBIST 2014 - Proceedings of the 10th International Conference on Web Information Systems and Technologies, 1, 82–92. https://doi.org/10.5220/0004946400820092

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free