Identity Management as a Service in Cloud

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4

Abstract

Cloud computing Technologies have decreased the expense of advancement as expense of responsibility has been diminished and it empowers adaptable and proficient access to data. With these innovations there is inevitable risk of unapproved access of basic data. One of the regions that need to be checked is identity management. In this paper we are going to propose a conceivable answer to oversee identity management in cloud.

Authors and Affiliations

Keywords

Related Articles

Aluminium Phosphide Poisoning: A Case Series in South India

Aluminium phosphide(AlP) poisoning is a life threatening emergency. AlP is a cheap,highly toxic fumigant pesticide used for grain preservation from rodents and bugs. In this study, demographic characteristics,clinical pr...

Securing TCP/IP Stacks Using IP Tables

Abstract - The Transmission Control Protocol/Internet Protocol (TCP/IP) suite has become a widely method of interconnecting hosts, networks, and the internet at large. The TCP/IP protocol suite is vulnerable to a variety...

Experimental Analysis on Effect of Design Parameters on the Performance of Single Loop Pulsating Heat Pipe

The increasing the demand of electronics cooling in the field of science, the novel technologies available with us to reduce such type of load on the devices. The pulsating heat pipe (PHP) is one of the advance technolog...

A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data

Data privacy problems square measure more and more turning into vital for several applications. Access management mechanisms give protection to our sensitive business information from unwanted user. Resource and informat...

Enhancing the Security of Playfair Square Cipher by Double Substitution and Transposition Techniques

Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique.In recent years...

Download PDF file
  • EP ID EP364192
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

(2015). Identity Management as a Service in Cloud. UNKNOWN, 4(4), -. https://europub.co.uk/articles/-A-364192