Identity management for cloud computing: Developments and directions

Kevin Hamlen*, Peng Liu, Murat Kantarcioglu, Bhavani Thuraisingham, Ting Yu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

Cloud computing technologies have been rapidly adopted by organizations to lower costs and to enable flexible and efficient access to critical data. As these new cloud technologies emerge, cyber security challenges associated with these technologies have increased at a rapid pace. One of the critical areas that needs attention for secure cloud computing is identity management where the multiple identities of cloud users operating possibly in a federated environment have to be managed and maintained. In this paper, we first explore identity management technologies and secure cloud computing technologies. We will then discuss some of the security balances for cloud computing with respect to identity management.

Original languageEnglish
Title of host publication7th Annual Cyber Security and Information Intelligence Research Workshop
Subtitle of host publicationEnergy Infrastructure Cyber Protection, CSIIRW11
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11 - Oak Ridge, TN, United States
Duration: 12 Oct 201114 Oct 2011

Publication series

NameACM International Conference Proceeding Series

Conference

Conference7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11
Country/TerritoryUnited States
CityOak Ridge, TN
Period12/10/1114/10/11

Fingerprint

Dive into the research topics of 'Identity management for cloud computing: Developments and directions'. Together they form a unique fingerprint.

Cite this