Cloud Identity and Access Management – A Model Proposal
Even if in a typical organization, where applications are deployed within the organization’s perimeter, the “trust boundary” is mostly static and is monitored and controlled by the IT department; with the adoption of cloud services, the organization’s trust boundary will become dynamic and will move beyond the control of IT. With cloud computing, the network, system, and application boundary of an organization will extend into the service provider domain. This loss of control continues to challenge the established trusted governance and control model, and, if not managed properly, will obstruct cloud service adoption within an organization. Based on both literature review and action research, the paper at hand is a synthesis for the results of a thorough review of the opinions and study attempts performed during the last years among Romanian and foreign companies, in order to find and formulate a consistent model for the integrated identity and access management, and, if possible, a cloud extension of the model. The paper is a part of a larger research performed by the author in the field of cloud computing and the neighboring technologies.
Volume (Year): 11 (2012)
Issue (Month): 3 (September)
|Contact details of provider:|| |
When requesting a correction, please mention this item's handle: RePEc:ami:journl:v:11:y:2012:i:3:p:484-500. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Cristina Tartavulea)
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.