How to Adapt Authentication and Authorization Infrastructure of Applications for the Cloud.
Tri Hoang VoWoldemar F. FuhrmannKlaus Peter Fischer-HellmannPublished in: FiCloud (2017)
Keyphrases
- access control
- identity management
- trust relationships
- cloud computing
- security requirements
- usage control
- computing infrastructure
- computing platform
- fine grained
- cloud services
- trust negotiation
- private cloud
- security policies
- security mechanisms
- changing environment
- security analysis
- trust management
- information exchange
- network access
- data center
- data collection
- authentication mechanism
- smart card
- public key infrastructure
- information security
- security services
- computing paradigm
- personal information
- biometric authentication
- service providers
- security protocols