Cloud Identity and Access Management – A Model Proposal
AbstractEven if in a typical organization, where applications are deployed within the organization’s perimeter, the “trust boundary” is mostly static and is monitored and controlled by the IT department; with the adoption of cloud services, the organization’s trust boundary will become dynamic and will move beyond the control of IT. With cloud computing, the network, system, and application boundary of an organization will extend into the service provider domain. This loss of control continues to challenge the established trusted governance and control model, and, if not managed properly, will obstruct cloud service adoption within an organization. Based on both literature review and action research, the paper at hand is a synthesis for the results of a thorough review of the opinions and study attempts performed during the last years among Romanian and foreign companies, in order to find and formulate a consistent model for the integrated identity and access management, and, if possible, a cloud extension of the model. The paper is a part of a larger research performed by the author in the field of cloud computing and the neighboring technologies.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoArticle provided by Faculty of Accounting and Management Information Systems, The Bucharest University of Economic Studies in its journal Journal of Accounting and Management Information Systems.
Volume (Year): 11 (2012)
Issue (Month): 3 (September)
Contact details of provider:
Cloud computing; Identity as a Service; Identity management; Access management; Control systems;
Find related papers by JEL classification:
- M15 - Business Administration and Business Economics; Marketing; Accounting - - Business Administration - - - IT Management
You can help add them by filling out this form.
reading list or among the top items on IDEAS.Access and download statisticsgeneral information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Cristina Geambasu) The email address of this maintainer does not seem to be valid anymore. Please ask Cristina Geambasu to update the entry or send us the correct address.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.