1 |
MANGIUC, D. M. (2012, June). Cloud Identity and Access Management-A Model Proposal. In Proceedings of the 7th International Conference Accounting and management information systems AMIS 2012 (Vol. 7, No. 1, pp. 1014-1027).
|
2 |
Gartner. "Market Trends: Cloud-Based Security Services Market, Worldwide,"2013
|
3 |
Gopalakrishnan, Anu. "Cloud computing identity management." SETLabs briefings 7.7 (2009): 45-55.
|
4 |
Varia, Jinesh. "Best practices in architecting cloud applications in the AWS cloud." Cloud Computing: Principles and Paradigms (2011): 459-490.
|
5 |
IAM Cloud, http://www.iamcloud.com/
|
6 |
Chadwick, D. W., Siu, K., Lee, C., Fouillat, Y., & Germonville, D. (2014). Adding federated identity management to openstack. Journal of Grid Computing, 12(1), 3-27.
DOI
|
7 |
Habiba, U., Masood, R., Shibli, M. A., & Niazi, M. A. (2014). Cloud identity management security issues & solutions: a taxonomy. Complex Adaptive Systems Modeling, 2(1), 1-37.
DOI
|