Matches in SemOpenAlex for { <https://semopenalex.org/work/W3193761457> ?p ?o ?g. }
Showing items 1 to 61 of
61
with 100 items per page.
- W3193761457 endingPage "8" @default.
- W3193761457 startingPage "1" @default.
- W3193761457 abstract "This paper discusses the application of cloud identity and access management in digital transformation and cloud adoption. Cloud computing refers to a fusion of various technologies, including grid computing and distributed computing, that makes use of the Internet as a service delivery network [1]. Organizations need the ability to choose the services and pricing models that best meet their needs, and budgetary constraints. It is the cloud service providers that set the price model for their cloud services, considering factors like instance size, utilization size (per hour), users’ size (per user), infrastructure size (per hour), and service size (per service). The majority of businesses are hosting or implementing web services in a cloud infrastructure for the convenience of administration and increased availability [1]. Multi-tenant setups are also utilized in cloud-based services to reduce the cost considerations associated with the services. To accomplish multi-tenancy in the cloud, virtual environments are utilized. A vulnerability in virtual machines poses a direct danger to the privacy and security of the people who are using them [2]. Security problems in cloud web services are found in particular areas such as authentication, authorization, data protection, and accountability, among other things. Cloud security is critical to business and technology sustainability. Even though the boundary is largely static and monitored and managed by the IT unit in a centralized company where functionality is being implemented within the perimeter of the company, the trust limit becomes dynamic and moves beyond IT command with the adoption of cloud computing [3]. A company's servers, systems, and applications boundaries will expand into the service provider domains. In addition, this loss of control poses a threat to the existing trusted governance and management paradigm, and it has the potential to impede the adoption of cloud services inside an organization if it is not handled correctly. Modern organizations understand the significance of protecting identities in the era of remote work and cloud hosting inside the zero boundaries, Zero Trust. However, as the quantity, kinds, and interrelationships of identities continue to grow exponentially across cloud settings, it is clear that this is a far easier said than done task [3]. Cloud security is widely acknowledged to be a shared duty between cloud service providers and their customers, at least in theory. In the process of determining the best Identity and Access Management (IAM) policies for these settings, many companies are confronted with issues such as: When are cloud-native technologies adequate, and when should we explore specialist solutions from other vendors? With all of the IT security jargon flying about, it may be difficult to discern the difference." @default.
- W3193761457 created "2021-08-30" @default.
- W3193761457 creator A5012979309 @default.
- W3193761457 date "2019-10-31" @default.
- W3193761457 modified "2023-09-25" @default.
- W3193761457 title "CLOUD IDENTITY AND ACCESS MANAGEMENT – A MODEL PROPOSAL" @default.
- W3193761457 hasPublicationYear "2019" @default.
- W3193761457 type Work @default.
- W3193761457 sameAs 3193761457 @default.
- W3193761457 citedByCount "0" @default.
- W3193761457 crossrefType "journal-article" @default.
- W3193761457 hasAuthorship W3193761457A5012979309 @default.
- W3193761457 hasConcept C111919701 @default.
- W3193761457 hasConcept C148417208 @default.
- W3193761457 hasConcept C172191483 @default.
- W3193761457 hasConcept C184842701 @default.
- W3193761457 hasConcept C38652104 @default.
- W3193761457 hasConcept C41008148 @default.
- W3193761457 hasConcept C555379026 @default.
- W3193761457 hasConcept C76155785 @default.
- W3193761457 hasConcept C79974875 @default.
- W3193761457 hasConceptScore W3193761457C111919701 @default.
- W3193761457 hasConceptScore W3193761457C148417208 @default.
- W3193761457 hasConceptScore W3193761457C172191483 @default.
- W3193761457 hasConceptScore W3193761457C184842701 @default.
- W3193761457 hasConceptScore W3193761457C38652104 @default.
- W3193761457 hasConceptScore W3193761457C41008148 @default.
- W3193761457 hasConceptScore W3193761457C555379026 @default.
- W3193761457 hasConceptScore W3193761457C76155785 @default.
- W3193761457 hasConceptScore W3193761457C79974875 @default.
- W3193761457 hasIssue "10" @default.
- W3193761457 hasLocation W31937614571 @default.
- W3193761457 hasOpenAccess W3193761457 @default.
- W3193761457 hasPrimaryLocation W31937614571 @default.
- W3193761457 hasRelatedWork W100921448 @default.
- W3193761457 hasRelatedWork W104257152 @default.
- W3193761457 hasRelatedWork W1136382157 @default.
- W3193761457 hasRelatedWork W122292959 @default.
- W3193761457 hasRelatedWork W1509726177 @default.
- W3193761457 hasRelatedWork W2071992883 @default.
- W3193761457 hasRelatedWork W2183558172 @default.
- W3193761457 hasRelatedWork W2183867295 @default.
- W3193761457 hasRelatedWork W2184778312 @default.
- W3193761457 hasRelatedWork W2291734470 @default.
- W3193761457 hasRelatedWork W2314876467 @default.
- W3193761457 hasRelatedWork W2460221822 @default.
- W3193761457 hasRelatedWork W2586096878 @default.
- W3193761457 hasRelatedWork W2612191699 @default.
- W3193761457 hasRelatedWork W265439194 @default.
- W3193761457 hasRelatedWork W321888353 @default.
- W3193761457 hasRelatedWork W50641515 @default.
- W3193761457 hasRelatedWork W2187713772 @default.
- W3193761457 hasRelatedWork W2339766526 @default.
- W3193761457 hasRelatedWork W2582850035 @default.
- W3193761457 hasVolume "6" @default.
- W3193761457 isParatext "false" @default.
- W3193761457 isRetracted "false" @default.
- W3193761457 magId "3193761457" @default.
- W3193761457 workType "article" @default.