메뉴 건너뛰기




Volumn 20, Issue 4, 2012, Pages 513-533

A metric-based approach to assess risk for "On cloud" federated identity management

Author keywords

Cloud computing; Federation; Risk assessment metrics; SAML; Trust management

Indexed keywords

ASSESSMENT METRICS; CLOUD PROVIDERS; COMPUTING PARADIGM; FEDERATED IDENTITY; FEDERATION; GLOBAL SCALABILITY; IDENTITY MANAGEMENT SYSTEMS; INTER-DOMAIN; RESEARCH CHALLENGES; RISK EVALUATION; RISK QUANTIFICATION; SAML; SECURITY PROBLEMS; SERVICE PROVISIONING; TRUST MANAGEMENT; TRUST MODELS;

EID: 84867249207     PISSN: 10647570     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10922-012-9244-2     Document Type: Article
Times cited : (25)

References (49)
  • 1
    • 77954051808 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST). Accessed 15 June 2012
    • Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology (NIST). http://csrc.nist.gov/publications/ nistpubs/800-145/SP800-145.pdf (2009). Accessed 15 June 2012
    • (2009) The NIST Definition of Cloud Computing
    • Mell, P.1    Grance, T.2
  • 3
    • 70349309706 scopus 로고    scopus 로고
    • Data security in the world of cloud computing
    • Harauz, J., Kaufman, L.M., Potter, B.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61-64 (2009)
    • (2009) IEEE Secur. Priv. , vol.7 , Issue.4 , pp. 61-64
    • Harauz, J.1    Kaufman, L.M.2    Potter, B.3
  • 4
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1-11 (2011)
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 5
    • 78650573573 scopus 로고    scopus 로고
    • Cloud computing identity management
    • Gopalakrishnan, A.: Cloud computing identity management. SETLabs Brief 7(7), 45-55 (2009)
    • (2009) SETLabs Brief , vol.7 , Issue.7 , pp. 45-55
    • Gopalakrishnan, A.1
  • 9
    • 77957962695 scopus 로고    scopus 로고
    • Accessed 15 June 2012
    • Open Cloud Manifesto: Open Cloud Manifesto. http://www. opencloudmanifesto.org/(2009). Accessed 15 June 2012
    • (2009) Open Cloud Manifesto
  • 13
    • 0025791156 scopus 로고
    • Software risk management: Principles and practices
    • Boehm, B.W.: Software risk management: principles and practices. IEEE Softw. 8(1), 32-42 (1991)
    • (1991) IEEE Softw , vol.8 , Issue.1 , pp. 32-42
    • Boehm, B.W.1
  • 15
    • 41949086982 scopus 로고    scopus 로고
    • The venn of identity: Options and issues in federated identity management
    • Maler, E., Reed, D.: The venn of identity: options and issues in federated identity management. IEEE Secur. Priv. 6(2), 16-23 (2008)
    • (2008) IEEE Secur. Priv. , vol.6 , Issue.2 , pp. 16-23
    • Maler, E.1    Reed, D.2
  • 16
    • 41949093741 scopus 로고    scopus 로고
    • Accessed 15 June 2012
    • OpenID: OpenID Authentication 2.0. http://openid.net/specs/openid- authentication-2-0.html (2007). Accessed 15 June 2012
    • (2007) OpenID Authentication 2.0.
  • 20
    • 84867256224 scopus 로고    scopus 로고
    • Accessed 15 June 2012
    • Kantara Initiative. http://kantarainitiative.org/. Accessed 15 June 2012
  • 21
    • 84867242447 scopus 로고    scopus 로고
    • Accessed 15 June 2012
    • Terena TF-EMC2: REFEDs Federation Survey. https://refeds.terena.org/ index.php/Federations. Accessed 15 June 2012
    • REFEDs Federation Survey.
  • 28
    • 0025700933 scopus 로고
    • How to make a decision: The analytic hierarchy process
    • Saaty, T.L.: How to make a decision: the analytic hierarchy process. Eur. J. Oper. Res. 48(1), 9-26 (1990)
    • (1990) Eur. J. Oper. Res. , vol.48 , Issue.1 , pp. 9-26
    • Saaty, T.L.1
  • 29
    • 0012719654 scopus 로고    scopus 로고
    • Aggregation operators: Properties, classes and construction methods
    • Calvo, T., Mayor, G., Mesiar, R. (eds.). Physica-Verlag, Heidelberg
    • Calvo, T., Kolesárová, A., Komorníková, M., Mesiar, R.: Aggregation operators: properties, classes and construction methods. In: Calvo, T., Mayor, G., Mesiar, R. (eds.) Aggregation Operators. New Trends and Applications, pp. 3-104. Physica-Verlag, Heidelberg (2001)
    • (2001) Aggregation Operators. New Trends and Applications , pp. 3-104
    • Calvo, T.1    Kolesárová, A.2    Komorníková, M.3    Mesiar, R.4
  • 30
    • 34248666540 scopus 로고
    • Fuzzy sets
    • Zadeh, L.A.: Fuzzy sets. Inform. Control 8(3), 338-353 (1965)
    • (1965) Inform. Control , vol.8 , Issue.3 , pp. 338-353
    • Zadeh, L.A.1
  • 35
    • 79952440250 scopus 로고    scopus 로고
    • Architectural requirements for cloud computing systems: An enterprise cloud approach
    • Rimal, B.P., Jukan, A., Katsaros, D., Goeleven, Y.: Architectural requirements for cloud computing systems: an enterprise cloud approach. J. Comput. 9(1), 3-26 (2011)
    • (2011) J. Comput. , vol.9 , Issue.1 , pp. 3-26
    • Rimal, B.P.1    Jukan, A.2    Katsaros, D.3    Goeleven, Y.4
  • 37
    • 77954595043 scopus 로고    scopus 로고
    • Accessed 15 June 2012
    • Hammer-Lahav, E. (ed.): The OAuth 1.0 Protocol. http://tools.ietf.org/ html/draft-hammer-oauth-10 (2010). Accessed 15 June 2012
    • (2010) The OAuth 1.0 Protocol.
    • Hammer-Lahav, E.1
  • 40
    • 79959433819 scopus 로고    scopus 로고
    • Information Technology Laboratory. National Institute of Standards and Technology (NIST). Accessed 15 June 2012
    • Jansen, W., Grance, T.: Guidelines on Security and Privacy in Public Cloud Computing. Information Technology Laboratory. National Institute of Standards and Technology (NIST). http://csrc.nist.gov/publications (2011). Accessed 15 June 2012
    • (2011) Guidelines on Security and Privacy in Public Cloud Computing
    • Jansen, W.1    Grance, T.2
  • 49
    • 79951680628 scopus 로고    scopus 로고
    • Trust management for multimedia P2P applications in autonomic networking
    • Almenarez, F., Marín, A., Díaz, D., Cortés, A., Campo, C., García, C.: Trust management for multimedia P2P applications in autonomic networking. Ad Hoc Netw. 9(4), 687-697 (2011)
    • (2011) Ad Hoc Netw , vol.9 , Issue.4 , pp. 687-697
    • Almenarez, F.1    Marín, A.2    Díaz, D.3    Cortés, A.4    Campo, C.5    García, C.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.