Unique identification and secure authentication are essential processes in various areas of application, e.g. in e-Government, e-Health, or e-Business. During the past years several identity management-systems and models have evolved. Many organizations and enterprises or even countries for their national eID solutions rely on identity management-systems for securing their applications. Since more and more applications are migrated into the cloud, secure identification and authentication are also vital in the cloud domain. However, cloud identity management-systems need to meet slightly different requirements than traditional identity management-systems and thus cannot be clustered into the same model types or categories. Therefore, in this paper we give an overview of different cloud identity management-models that have already emerged up to now. We further compare these models based on selected criteria, e.g. on practicability and privacy aspects. Copyright © 2014 SCITEPRESS.
CITATION STYLE
Zwattendorfer, B., Zefferer, T., & Stranacher, K. (2014). An overview of cloud identity management-models. WEBIST 2014 - Proceedings of the 10th International Conference on Web Information Systems and Technologies, 1, 82–92. https://doi.org/10.5220/0004946400820092
Mendeley helps you to discover research relevant for your work.