Authentication in the Cloud: A Risk-Based Approach

Download Now
Provided by: University of Presov
Topic: Security
Format: PDF
Most companies are moving their data and applications to the cloud in order to exploit the numerous benefits that this computing paradigm presents. Yet, there is still insufficient research on how user authentication is to be handled on cloud computing environments. Cloud computing challenges the way people think about authentication and how to manage user identity across multiple domains. Hence, this paper outlines the requirements for user authentication and handling identity on the cloud. It goes further to discuss real world scenarios that illustrates the multi-faceted nature of handling authentication within a cloud environment.
Download Now

Find By Topic