Please use this identifier to cite or link to this item: https://idr.l1.nitk.ac.in/jspui/handle/123456789/13806
Full metadata record
DC FieldValueLanguage
dc.contributor.authorThomas M.V.
dc.contributor.authorChandrasekaran K.
dc.date.accessioned2020-03-31T14:15:23Z-
dc.date.available2020-03-31T14:15:23Z-
dc.date.issued2016
dc.identifier.citationIdentity Theft: Breakthroughs in Research and Practice, 2016, Vol., pp.38-68en_US
dc.identifier.uri10.4018/978-1-5225-0808-3.ch003
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/13806-
dc.description.abstractNowadays, the issue of identity and access management (IAM) has become an important research topic in cloud computing. In the distributed computing environments like cloud computing, effective authentication and authorization are essential to make sure that unauthorized users do not access the resources, thereby ensuring the confidentiality, integrity, and availability of information hosted in the cloud environment. In this chapter, the authors discuss the issue of identity and access management in cloud computing, analyzing the work carried out by others in the area. Also, various issues in the current IAM scenario in cloud computing, such as authentication, authorization, access control models, identity life cycle management, cloud identity-as-a-service, federated identity management and also, the identity and access management in the inter-cloud environment are discussed. The authors conclude this chapter discussing a few research issues in the area of identity and access management in the cloud and inter-cloud environments. © 2017 by IGI Global. All rights reserved.en_US
dc.titleIdentity and access management in the cloud computing environmentsen_US
dc.typeBook Chapteren_US
Appears in Collections:3. Book Chapters

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.