A STUDY OF ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT
Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY (Vol.3, No. 3)Publication Date: 2013-01-01
Authors : Mauro Melo; Zair Abdelouahab;
Page : 453-457
Keywords : Cloud Computing; Authentication; Identity Management;
Abstract
An analysis of research works on access in a cloud computing environment. The authentication and access authorization should be prioritized in the area of ??computer security for protection of personal identifiable information contained in a cloud provider. To protect users as well as the provider of cloud services, security can be shared by reliable sources and also compatible with others in the federation This work investigates the access control mechanism in the cloud.?
Other Latest Articles
- Fuzzy Approach for pattern recognition using Classification Algorithms
- BUSINESS TO BUSINESS (B2B) AND BUSINESS TO CONSUMER (B2C) MANAGEMENT
- A Statistical-Based Map Matching Algorithm
- IMPLEMENTATION OF FINGER TOKEN AUTHENTICATION TECHNIQUE USING ARTIFICIAL INTELLIGENCE APPROACH IN NTT MICROSYSTEMS
- Information Management
Last modified: 2016-06-30 14:13:24