Different Patterns of Identity Management Implemented in Cloud Computing

To overcome the multiple accounts owned by users is by providing Identity as a Service (IaaS) through provision if using different types of patterns of cloud in identity management order to avoid verifying identity of each individual every time when they login. The overall objective of security, private and trust challenges arise from the technological underpinnings of cloud computing is a principle to guide decisions and achieve rational outcomes to confirm that users of cloud environments are given total protections, to strengthen and stabilize a world leading cloud ecosystem.

Provided by: International Association of Computer Science & Information Technology (IACSIT) Topic: Cloud Date Added: Dec 2011 Format: PDF

Find By Topic