会议专题

Standard Based IAM Implementation Strategy in Cloud Computing

As an emerging network applications model, clond computing has many attractive advantages. However, the security problem of the cloud computing is also very prominent; one of the main issues of the cloud computing security is the identity and access control management (IAM). A good IAM system in cloud computing should has the characteristics of integration, openness, completeness (IOC). For this aim, we propose an IAM system implementation strategy based on standard protocols. This strategy can not only realize 1AM automation configuration management under the cloud computing environment, but also achieve unified management capabilities among different systems. Analysis shows that the proposed idea meets the IOC requirements of the IAM system and can act as a reference in creating secure cloud computing services.

Identity and access control management IAM SAML SPML XACML

Hongxia Li Qiaoyan Wen Xiaojun Yu

State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Communications Beijing, China

国际会议

2010 International Conference on Information Security and Artificial Intelligence(2010年信息安全与人工智能国际会议 ISAI 2010)

成都

英文

1406-1409

2010-12-17(万方平台首次上网日期,不代表论文的发表时间)