TY - CHAP AU - Albeshri, A. AU - Caelli, W. PY - 2010 DA - 2010// TI - Mutual protection in a cloud computing environment BT - High Performance Computing and Communications (HPCC), 2010 12th IEEE International Conference on PB - IEEE, Piscataway CY - New Jersey, United States UR - https://doi.org/10.1109/HPCC.2010.87 DO - 10.1109/HPCC.2010.87 ID - Albeshri2010 ER - TY - STD TI - Almorsy, M, Grundy J, Müller I: An analysis of the cloud computing security problem. In Proceedings of APSEC 2010 Cloud Workshop. Sydney, Australia; 2010. ID - ref2 ER - TY - CHAP AU - Alrodhan, W. A. AU - Mitchell, C. J. PY - 2010 DA - 2010// TI - Enhancing user authentication in claim-based identity management BT - Collaborative Technologies and Systems (CTS), 2010 International Symposium on PB - IEEE, Piscataway CY - New Jersey, United States UR - https://doi.org/10.1109/CTS.2010.5478521 DO - 10.1109/CTS.2010.5478521 ID - Alrodhan2010 ER - TY - CHAP AU - Angin, P. AU - Bhargava, B. AU - Ranchal, R. AU - Singh, N. AU - Linderman, M. AU - Othmane, L. B. AU - Lilien, L. PY - 2010 DA - 2010// TI - An entity-centric approach for privacy and identity management in cloud computing BT - Reliable Distributed Systems, 2010 29th IEEE Symposium on PB - IEEE, Piscataway CY - New Jersey, United States UR - https://doi.org/10.1109/SRDS.2010.28 DO - 10.1109/SRDS.2010.28 ID - Angin2010 ER - TY - JOUR AU - Arias-Cabarcos, P. AU - Almenárez-Mendoza, F. AU - Marín-López, A. AU - Díaz-Sánchez, D. AU - Sánchez-Guerrero, R. PY - 2012 DA - 2012// TI - A metric-based approach to assess risk for “on cloud” federated identity management JO - J Netw Syst Manag VL - 20 UR - https://doi.org/10.1007/s10922-012-9244-2 DO - 10.1007/s10922-012-9244-2 ID - Arias-Cabarcos2012 ER - TY - CHAP AU - Ates, M. AU - Ravet, S. AU - Ahmat, A. M. AU - Fayolle, J. PY - 2011 DA - 2011// TI - An identity-centric internet: identity in the cloud, identity as a service and other delights BT - 2012 Seventh International Conference on Availability, Reliability and Security PB - IEEE, Piscataway CY - New Jersey, United States ID - Ates2011 ER - TY - STD TI - Bertino, E, Takahashi K: IdentityManagement: Concepts, Technologies, and Systems: ARTECH HOUSE, 16 Sussex Street, London SW1V 4RW UK; 2010. ID - ref7 ER - TY - BOOK AU - Bhadauria, R. AU - Chaki, R. AU - Chaki, N. AU - Sanyal, S. PY - 2011 DA - 2011// TI - A survey on security issues in cloud computing ID - Bhadauria2011 ER - TY - JOUR AU - Bhargav-Spantzel, A. AU - Camenisch, J. AU - Gross, T. AU - Sommer, D. PY - 2007 DA - 2007// TI - User centricity: a taxonomy and open issues JO - J Comput Secur VL - 15 ID - Bhargav-Spantzel2007 ER - TY - STD TI - Brute Force Attack. OWASP Testing Guide2013. [Online accessed September-2013]., [https://www.owasp.org/index.php/Brute_force_attack] UR - https://www.owasp.org/index.php/Brute_force_attack ID - ref10 ER - TY - STD TI - CA Technologies Inc.: CA Technologies Predicts Key Trends for Identity and Access Management in 20142014. . Online accessed April-2013., [http://www.ca.com/us/news/press-releases/na/2014/ca-technologies-predicts-key-trends-for-identity-and-access-management-in-2014.aspx] UR - http://www.ca.com/us/news/press-releases/na/2014/ca-technologies-predicts-key-trends-for-identity-and-access-management-in-2014.aspx ID - ref11 ER - TY - BOOK AU - Cameron, K. PY - 2005 DA - 2005// TI - The laws of identity: Microsoft Corp. ID - Cameron2005 ER - TY - CHAP AU - Cao, Y. AU - Yang, L. PY - 2010 DA - 2010// TI - A survey of identitymanagement technology BT - IEEE International Conference on Information Theory and Information Security (ICITIS) ID - Cao2010 ER - TY - CHAP AU - Celesti, A. AU - Tusa, F. AU - Villari, M. AU - Puliafito, A. PY - 2010 DA - 2010// TI - Security and cloud computing: intercloud identity management infrastructure BT - Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2010 19th IEEE International Workshop on PB - IEEE, Piscataway CY - New Jersey, United States UR - https://doi.org/10.1109/WETICE.2010.49 DO - 10.1109/WETICE.2010.49 ID - Celesti2010 ER - TY - CHAP AU - Chadwick, D. W. AU - Casenove, M. PY - 2011 DA - 2011// TI - Security APIs for my private cloud-granting access to anyone, from anywhere at any time BT - Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on PB - IEEE, Piscataway CY - New Jersey, United States UR - https://doi.org/10.1109/CloudCom.2011.122 DO - 10.1109/CloudCom.2011.122 ID - Chadwick2011 ER - TY - JOUR AU - Chang, C. -. C. PY - 2003 DA - 2003// TI - Some forgery attacks on a remote user authentication scheme using smart cards JO - Informatica VL - 14 ID - Chang2003 ER - TY - CHAP AU - Chen, D. AU - Zhao, H. PY - 2012 DA - 2012// TI - Data security and privacy protection issues in cloud computing BT - Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/ICCSEE.2012.193 DO - 10.1109/ICCSEE.2012.193 ID - Chen2012 ER - TY - CHAP AU - Chen, J. AU - Wu, X. AU - Zhang, S. AU - Zhang, W. AU - Niu, Y. PY - 2012 DA - 2012// TI - A decentralized approach for implementing identity management in cloud computing BT - Cloud and Green Computing (CGC), 2012 Second International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/CGC.2012.118 DO - 10.1109/CGC.2012.118 ID - Chen2012 ER - TY - CHAP AU - Chowdhury, M. M. AU - Noll, J. PY - 2007 DA - 2007// TI - Distributed identity for secure service interaction BT - Wireless and Mobile Communications, 2007. ICWMC’07. Third International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/ICWMC.2007.33 DO - 10.1109/ICWMC.2007.33 ID - Chowdhury2007 ER - TY - CHAP AU - Choudhury, A. J. AU - Kumar, P. AU - Sain, M. AU - Lim, H. AU - Jae-Lee, H. PY - 2011 DA - 2011// TI - A strong user authentication framework for cloud computing BT - Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/APSCC.2011.14 DO - 10.1109/APSCC.2011.14 ID - Choudhury2011 ER - TY - STD TI - Cloud Security Alliance: Cloud Security Alliance SecaaS Guidance, Category 1: Identity and Access Management, 2012 by Cloud Security Alliance. [Online accessed: November 2013], 2011., [https://cloudsecurityalliance.org/download/secaas-category-1-identity-and-access-management-implementation-guidance/] UR - https://cloudsecurityalliance.org/download/secaas-category-1-identity-and-access-management-implementation-guidance/ ID - ref21 ER - TY - CHAP AU - Conrado, C. AU - Kamperman, F. AU - Schrijen, G. J. AU - Jonker, W. PY - 2003 DA - 2003// TI - Privacy in an identity-based DRM system BT - the Proceedings of Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/DEXA.2003.1232053 DO - 10.1109/DEXA.2003.1232053 ID - Conrado2003 ER - TY - JOUR AU - Dhamija, R. AU - Dusseault, L. PY - 2008 DA - 2008// TI - The seven flaws of identity management: usability and security challenges JO - IEEE Secur Privacy VL - 6 UR - https://doi.org/10.1109/MSP.2008.49 DO - 10.1109/MSP.2008.49 ID - Dhamija2008 ER - TY - CHAP AU - Donevski, A. AU - Ristov, S. AU - Gusev, M. PY - 2013 DA - 2013// TI - Security assessment of virtual machines in open source clouds BT - Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on PB - IEEE CY - Piscataway, New Jersey, United States ID - Donevski2013 ER - TY - STD TI - Eucalyptus Systems, Inc.: Eucalyptus Identity and Access Management (IAM)2012. , [Online accessed August-2014]., [https://www.eucalyptus.com/docs/eucalyptus/4.0/security-guide/security_bp_access.html] UR - https://www.eucalyptus.com/docs/eucalyptus/4.0/security-guide/security_bp_access.html ID - ref25 ER - TY - CHAP AU - Feng, J. AU - Chen, Y. AU - Ku, W. S. AU - Liu, P. PY - 2010 DA - 2010// TI - Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms BT - Parallel Processing Workshops (ICPPW), 2010 39th International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/ICPPW.2010.42 DO - 10.1109/ICPPW.2010.42 ID - Feng2010 ER - TY - CHAP AU - Ferdous, M. S. AU - Poet, R. PY - 2012 DA - 2012// TI - A comparative analysis of identity management systems BT - High Performance Computing and Simulation (HPCS) 2012 International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/HPCSim.2012.6266958 DO - 10.1109/HPCSim.2012.6266958 ID - Ferdous2012 ER - TY - BOOK AU - Fox, A. AU - Griffith, R. AU - Joseph, A. AU - Katz, R. AU - Konwinski, A. AU - Lee, G. AU - Patterson, D. AU - Rabkin, A. AU - Stoica, I. PY - 2009 DA - 2009// TI - Above the Clouds: a Berkeley View of Cloud Computing ID - Fox2009 ER - TY - JOUR AU - Gopalakrishnan, A. PY - 2009 DA - 2009// TI - Cloud computing identity management JO - SETLabs Briefings VL - 7 ID - Gopalakrishnan2009 ER - TY - CHAP AU - Gunjan, K. AU - Sahoo, G. AU - Tiwari, R. K. PY - 2012 DA - 2012// TI - Identity management in cloud computing-a review BT - International Journal of Engineering Research and Technology (Vol. 1, No. 4 (June-2012)) PB - ESRSA Publications CY - Kudasan, Gandhinagar, Gujarat, India ID - Gunjan2012 ER - TY - BOOK AU - Halpert, B. PY - 2011 DA - 2011// TI - Auditing Cloud Computing: a Security and Privacy Guide (Vol. 21) PB - Sons CY - Hoboken, New Jersey, USA UR - https://doi.org/10.1002/9781118269091 DO - 10.1002/9781118269091 ID - Halpert2011 ER - TY - CHAP AU - Hoellrigl, T. AU - Kühner, H. AU - Dinger, J. AU - Hartenstein, H. PY - 2010 DA - 2010// TI - User-controlled automated identity delegation BT - Network and Service Management (CNSM), 2010 International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/CNSM.2010.5691295 DO - 10.1109/CNSM.2010.5691295 ID - Hoellrigl2010 ER - TY - CHAP AU - Jansen, W. A. PY - 2011 DA - 2011// TI - Cloud hooks: Security and privacy issues in cloud computing BT - System Sciences (HICSS), 2011 44th Hawaii International Conference on PB - IEEE CY - Piscataway, New Jersey, United States ID - Jansen2011 ER - TY - BOOK AU - Jansen, W. AU - Grance, T. PY - 2011 DA - 2011// TI - Guidelines on Security and Privacy in Public Cloud Computing UR - https://doi.org/10.6028/NIST.SP.800-144 DO - 10.6028/NIST.SP.800-144 ID - Jansen2011 ER - TY - CHAP AU - Jensen, M. AU - Schwenk, J. AU - Gruschka, N. AU - Iacono, L. L. PY - 2009 DA - 2009// TI - On technical security issues in cloud computing BT - Cloud Computing, 2009. CLOUD’09. IEEE International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/CLOUD.2009.60 DO - 10.1109/CLOUD.2009.60 ID - Jensen2009 ER - TY - CHAP AU - Jøsang, A. AU - Fabre, J. AU - Hay, B. AU - Dalziel, J. AU - Pope, S. PY - 2005 DA - 2005// TI - Trust requirements in identitymanagement BT - Proceedings of the 2005 Australasian workshop on Grid computing and e-research-Volume 44 ID - Jøsang2005 ER - TY - CHAP AU - Kim, I. K. AU - Pervez, Z. AU - Khattak, A. M. AU - Lee, S. PY - 2010 DA - 2010// TI - Chord based identity management for e-Healthcare cloud applications BT - Applications and the Internet (SAINT), 2010 10th IEEE/IPSJ International Symposium on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/SAINT.2010.68 DO - 10.1109/SAINT.2010.68 ID - Kim2010 ER - TY - BOOK AU - Kumar, R. AU - Gupta, N. AU - Charu, S. AU - Jain, K. AU - Jangir, S. K. PY - 2014 DA - 2014// TI - Open Source Solution for Cloud Computing Platform Using OpenStack ID - Kumar2014 ER - TY - STD TI - Kumaraswamy, S, Lakshminarayanan S, Reiter M, Stein J, Wilson Y: Domain 12: Guidance for Identity & Access Management V2. 1. Cloud Security Alliance2010. , [https://cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf] UR - https://cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf ID - ref39 ER - TY - CHAP AU - Lang, U. PY - 2010 DA - 2010// TI - Openpmf scaas: authorization as a service for cloud & soa applications BT - Cloud Computing Technology and Science (CloudCom) 2010 IEEE Second International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/CloudCom.2010.13 DO - 10.1109/CloudCom.2010.13 ID - Lang2010 ER - TY - CHAP AU - Leandro, M. A. AU - Nascimento, T. J. PY - 2012 DA - 2012// TI - Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth BT - ICN 2012, The Eleventh International Conference on Networks ID - Leandro2012 ER - TY - CHAP AU - Leskinen, J. PY - 2012 DA - 2012// TI - Evaluation criteria for future identity management BT - Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/TrustCom.2012.153 DO - 10.1109/TrustCom.2012.153 ID - Leskinen2012 ER - TY - CHAP AU - Li, M. AU - Yu, S. AU - Ren, K. AU - Lou, W. PY - 2010 DA - 2010// TI - Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings BT - Security and Privacy in Communication Networks PB - Springer CY - Berlin, Heidelberg UR - https://doi.org/10.1007/978-3-642-16161-2_6 DO - 10.1007/978-3-642-16161-2_6 ID - Li2010 ER - TY - CHAP AU - Luo, S. AU - Hu, J. AU - Chen, Z. PY - 2009 DA - 2009// TI - An identity-based one-time password scheme with anonymous authentication BT - Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC’09. International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/NSWCTC.2009.287 DO - 10.1109/NSWCTC.2009.287 ID - Luo2009 ER - TY - CHAP AU - Mahmood, Z. PY - 2011 DA - 2011// TI - Data location and security issues in cloud computing BT - Emerging Intelligent Data and Web Technologies (EIDWT), 2011 International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/EIDWT.2011.16 DO - 10.1109/EIDWT.2011.16 ID - Mahmood2011 ER - TY - BOOK AU - Mather, T. AU - Kumaraswamy, S. AU - Latif, S. PY - 2009 DA - 2009// TI - Cloud security and privacy: an enterprise perspective on risks and compliance PB - O’Reilly Media, Inc. CY - Sebastopol, CA, USA ID - Mather2009 ER - TY - BOOK AU - McCallister, E. PY - 2010 DA - 2010// TI - Guide to Protecting the Confidentiality of Personally Identifiable Information PB - Diane Publishing CY - Collingdale, PA, United States UR - https://doi.org/10.6028/NIST.SP.800-122 DO - 10.6028/NIST.SP.800-122 ID - McCallister2010 ER - TY - STD TI - Maler, E, Mishra P, Philpott R: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML)2003. . Online accessed January-2013., [https://www.oasis-open.org/committees/download.php/3406/oasis-sstc-saml-core-1.1.pdf] UR - https://www.oasis-open.org/committees/download.php/3406/oasis-sstc-saml-core-1.1.pdf ID - ref48 ER - TY - BOOK AU - Meier, J. D. AU - Farre, C. AU - Taylor, J. AU - Bansode, P. AU - Gregersen, S. AU - Sundararajan, M. AU - Boucher, R. PY - 2009 DA - 2009// TI - Improving Web Services Security: Scenarios and Implementation Guidance forWCF ID - Meier2009 ER - TY - CHAP AU - Nabeel, M. AU - Bertino, E. AU - Kantarcioglu, M. AU - Thuraisingham, B. PY - 2011 DA - 2011// TI - Towards privacy preserving access control in the cloud BT - Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on PB - IEEE, Piscataway CY - New Jersey, United States ID - Nabeel2011 ER - TY - CHAP AU - O’Gorman, L. PY - 2003 DA - 2003// TI - Comparing passwords, tokens, and biometrics for user authentication BT - Proceedings of the IEEE PB - IEEE, Piscataway CY - New Jersey, United States ID - O’Gorman2003 ER - TY - JOUR AU - Olden, E. PY - 2011 DA - 2011// TI - Architecting a cloud-scale identity fabric JO - Computer VL - 44 UR - https://doi.org/10.1109/MC.2011.60 DO - 10.1109/MC.2011.60 ID - Olden2011 ER - TY - CHAP AU - Pashalidis, A. AU - Mitchell, C. J. PY - 2003 DA - 2003// TI - A taxonomy of single sign-on systems BT - Information Security and Privacy PB - Springer CY - Berlin, Heidelberg UR - https://doi.org/10.1007/3-540-45067-X_22 DO - 10.1007/3-540-45067-X_22 ID - Pashalidis2003 ER - TY - CHAP AU - Pearson, S. AU - Benameur, A. PY - 2010 DA - 2010// TI - Privacy, security and trust issues arising from cloud computing BT - Cloud Computing Technology and Science (CloudCom) 2010 IEEE Second International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/CloudCom.2010.66 DO - 10.1109/CloudCom.2010.66 ID - Pearson2010 ER - TY - CHAP AU - Ranchal, R. AU - Bhargava, B. AU - Othmane, L. B. AU - Lilien, L. AU - Kim, A. AU - Kang, M. AU - Linderman, M. PY - 2010 DA - 2010// TI - Protection of identity information in cloud computing without trusted third party BT - Reliable Distributed Systems, 2010 29th IEEE Symposium on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/SRDS.2010.57 DO - 10.1109/SRDS.2010.57 ID - Ranchal2010 ER - TY - JOUR AU - Ratha, N. K. AU - Connell, J. H. AU - Bolle, R. M. PY - 2001 DA - 2001// TI - Enhancing security and privacy in biometrics-based authentication systems JO - IBM Syst J VL - 40 UR - https://doi.org/10.1147/sj.403.0614 DO - 10.1147/sj.403.0614 ID - Ratha2001 ER - TY - STD TI - Rhoton, J: Discover OpenStack: the identity component keystone2013. . Online accessed August 2014., [http://www.ibm.com/developerworks/cloud/library/cl-openstack-keystone/index.html?ca=dat-] UR - http://www.ibm.com/developerworks/cloud/library/cl-openstack-keystone/index.html?ca=dat- ID - ref57 ER - TY - CHAP AU - Rimal, B. P. AU - Choi, E. AU - Lumb, I. PY - 2009 DA - 2009// TI - A taxonomy and survey of cloud computing systems BT - INC, IMS and IDC, 2009. NCM’09. Fifth International Joint Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/NCM.2009.218 DO - 10.1109/NCM.2009.218 ID - Rimal2009 ER - TY - STD TI - Rose, J, Rehse O, Rober B: The value of our digital identity: The Boston Consulting Group; 2011. , Online accessed March-2013., [http://www.libertyglobal.com/PDF/public-policy/The-Value-of-Our-Digital-Identity.pdf] UR - http://www.libertyglobal.com/PDF/public-policy/The-Value-of-Our-Digital-Identity.pdf ID - ref59 ER - TY - JOUR AU - Sanchez, R. AU - Almenares, F. AU - Arias, P. AU - Diaz-Sanchez, D. AU - Marín, A. PY - 2012 DA - 2012// TI - Enhancing privacy and dynamic federation in IdM for consumer cloud computing JO - IEEE Trans Consum Electron VL - 58 UR - https://doi.org/10.1109/TCE.2012.6170060 DO - 10.1109/TCE.2012.6170060 ID - Sanchez2012 ER - TY - JOUR AU - Salsano, S. AU - Veltri, L. AU - Papalilo, D. PY - 2002 DA - 2002// TI - SIP security issues: the SIP authentication procedure and its processing load JO - Network VL - 16 ID - Salsano2002 ER - TY - CHAP AU - Saripalli, P. AU - Walters, B. PY - 2010 DA - 2010// TI - Quirc: A quantitative impact and risk assessment framework for cloud security BT - Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/CLOUD.2010.22 DO - 10.1109/CLOUD.2010.22 ID - Saripalli2010 ER - TY - STD TI - Saroiu, S, Wolman A: Enabling new mobile applications with location proofs. In Proceedings of the 10th workshop on Mobile Computing Systems and Applications: ACM; 2009:3. ID - ref63 ER - TY - CHAP AU - Senk, C. AU - Dotzler, F. PY - 2011 DA - 2011// TI - Biometric Authentication as a service for enterprise identity management deployment: a data protection perspective BT - Availability, Reliability and Security (ARES), 2011 Sixth International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/ARES.2011.14 DO - 10.1109/ARES.2011.14 ID - Senk2011 ER - TY - CHAP AU - Shin, D. AU - Lopes, R. AU - Claycomb, W. PY - 2009 DA - 2009// TI - Authenticated dictionary-based attribute sharing in federated identity management BT - Information Technology: New Generations, 2009. ITNG’09. Sixth International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/ITNG.2009.193 DO - 10.1109/ITNG.2009.193 ID - Shin2009 ER - TY - STD TI - Slone, S: Identity management. A white paper: The open group identity management work area; 2004. ID - ref66 ER - TY - JOUR AU - Sodhi, G. PY - 2004 DA - 2004// TI - User provisioning with SPML JO - Inf Secur Tech Rep VL - 9 UR - https://doi.org/10.1016/S1363-4127(04)00018-4 DO - 10.1016/S1363-4127(04)00018-4 ID - Sodhi2004 ER - TY - JOUR AU - Subashini, S. AU - Kavitha, V. PY - 2011 DA - 2011// TI - A survey on security issues in service delivery models of cloud computing JO - J Netw Comput Appl VL - 34 UR - https://doi.org/10.1016/j.jnca.2010.07.006 DO - 10.1016/j.jnca.2010.07.006 ID - Subashini2011 ER - TY - JOUR AU - Suriadi, S. AU - Foo, E. AU - Jøsang, A. PY - 2009 DA - 2009// TI - A user-centric federated single sign-on system JO - J Netw Comput Appl VL - 32 UR - https://doi.org/10.1016/j.jnca.2008.02.016 DO - 10.1016/j.jnca.2008.02.016 ID - Suriadi2009 ER - TY - CHAP AU - Thompson, D. R. AU - Chaudhry, N. AU - Thompson, C. W. PY - 2006 DA - 2006// TI - “RFID security threat model BT - In the proceedings of Conference on Applied Research in Information Technology ID - Thompson2006 ER - TY - BOOK AU - Van der Hof, S. PY - 2011 DA - 2011// TI - Innovating Government: An Introduction to the Book (pp. 1-14) PB - TMC Asser Press CY - R.J. Schimmelpennincklaan, JN Den Haag UR - https://doi.org/10.1007/978-90-6704-731-9 DO - 10.1007/978-90-6704-731-9 ID - Van der Hof2011 ER - TY - CHAP AU - Wang, J. J. AU - Mu, S. PY - 2011 DA - 2011// TI - Security issues and countermeasures in cloud computing BT - Grey Systems and Intelligent Services (GSIS), 2011 IEEE International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/GSIS.2011.6043978 DO - 10.1109/GSIS.2011.6043978 ID - Wang2011 ER - TY - CHAP AU - Wang, L. AU - Wang, L. AU - Mambo, M. AU - Okamoto, E. PY - 2010 DA - 2010// TI - New identity-based proxy re-encryption schemes to prevent collusion attacks BT - Pairing-Based Cryptography-Pairing 2010 PB - Springer CY - Berlin, Heidelberg UR - https://doi.org/10.1007/978-3-642-17455-1_21 DO - 10.1007/978-3-642-17455-1_21 ID - Wang2010 ER - TY - BOOK AU - Windley, P. J. PY - 2005 DA - 2005// TI - Digital Identity PB - O’Reilly Media, Inc. CY - Sebastopol, CA, USA ID - Windley2005 ER - TY - CHAP AU - Yan, L. AU - Rong, C. AU - Zhao, G. PY - 2009 DA - 2009// TI - Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography BT - Cloud Computing PB - Springer CY - Berlin, Heidelberg UR - https://doi.org/10.1007/978-3-642-10665-1_15 DO - 10.1007/978-3-642-10665-1_15 ID - Yan2009 ER - TY - JOUR AU - Yassin, A. A. AU - Jin, H. AU - Ibrahim, A. AU - Qiang, W. AU - Zou, D. PY - 2012 DA - 2012// TI - Efficient password-based two factors authentication in cloud computing JO - Int J Secur Appl VL - 6 ID - Yassin2012 ER - TY - CHAP AU - You, P. AU - Peng, Y. AU - Liu, W. AU - Xue, S. PY - 2012 DA - 2012// TI - Security issues and solutions in cloud computing BT - Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/ICDCSW.2012.20 DO - 10.1109/ICDCSW.2012.20 ID - You2012 ER - TY - CHAP AU - Youseff, L. AU - Butrico, M. AU - Da Silva, D. PY - 2008 DA - 2008// TI - Toward a unified ontology of cloud computing BT - Grid Computing Environments Workshop, 2008. GCE’08 PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/GCE.2008.4738443 DO - 10.1109/GCE.2008.4738443 ID - Youseff2008 ER - TY - CHAP AU - Zhang, Y. AU - Chen, J. L. PY - 2010 DA - 2010// TI - Universal identity management model based on anonymous credentials BT - Services Computing (SCC), 2010 IEEE International Conference on PB - IEEE CY - Piscataway, New Jersey, United States UR - https://doi.org/10.1109/SCC.2010.46 DO - 10.1109/SCC.2010.46 ID - Zhang2010 ER - TY - JOUR AU - Zissis, D. AU - Lekkas, D. PY - 2012 DA - 2012// TI - Addressing cloud computing security issues JO - Future Generat Comput Syst VL - 28 UR - https://doi.org/10.1016/j.future.2010.12.006 DO - 10.1016/j.future.2010.12.006 ID - Zissis2012 ER - TY - CHAP AU - Zhou, Y. AU - Feng, D. PY - 2005 DA - 2005// TI - Side-channel attacks: ten years after its publication and the impacts on cryptographicmodule security testing BT - IACR Cryptology ePrint Archive, Volume 2005 ID - Zhou2005 ER -