Standard Based IAM Implementation Strategy in Cloud Computing
As an emerging network applications model, clond computing has many attractive advantages. However, the security problem of the cloud computing is also very prominent; one of the main issues of the cloud computing security is the identity and access control management (IAM). A good IAM system in cloud computing should has the characteristics of integration, openness, completeness (IOC). For this aim, we propose an IAM system implementation strategy based on standard protocols. This strategy can not only realize 1AM automation configuration management under the cloud computing environment, but also achieve unified management capabilities among different systems. Analysis shows that the proposed idea meets the IOC requirements of the IAM system and can act as a reference in creating secure cloud computing services.
Identity and access control management IAM SAML SPML XACML
Hongxia Li Qiaoyan Wen Xiaojun Yu
State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Communications Beijing, China
国际会议
成都
英文
1406-1409
2010-12-17(万方平台首次上网日期,不代表论文的发表时间)