Journal of Accounting and Management Information Systems (JAMIS)


CLOUD IDENTITY AND ACCESS MANAGEMENT – A MODEL PROPOSAL

Vol. 11, Nr. 3/2012 ,   p484..500

Author(s):  
Dragos MANGIUC


Keywords:   Cloud computing, Identity as a Service, Identity management, Access management, Control systems

Abstract:  

Even if in a typical organization, where applications are deployed within the organization’s perimeter, the “trust boundary” is mostly static and is monitored and controlled by the IT department; with the adoption of cloud services, the organization’s trust boundary will become dynamic and will move beyond the control of IT. With cloud computing, the network, system, and application boundary of an organization will extend into the service provider domain. This loss of control continues to challenge the established trusted governance and control model, and, if not managed properly, will obstruct cloud service adoption within an organization. Based on both literature review and action research, the paper at hand is a synthesis for the results of a thorough review of the opinions and study attempts performed during the last years among Romanian and foreign companies, in order to find and formulate a consistent model for the integrated identity and access management, and, if possible, a cloud extension of the model. The paper is a part of a larger research performed by the author in the field of cloud computing and the neighboring technologies.



Download:   http://online-cig.ase.ro/jcig/art/

Back