{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:42:51Z","timestamp":1742924571786,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":65,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642289583"},{"type":"electronic","value":"9783642289590"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-28959-0_11","type":"book-chapter","created":{"date-parts":[[2012,7,20]],"date-time":"2012-07-20T23:51:56Z","timestamp":1342828316000},"page":"175-199","source":"Crossref","is-referenced-by-count":13,"title":["Identity Management for Cloud Computing"],"prefix":"10.1007","author":[{"given":"Alina M\u0103d\u0103lina","family":"Lonea","sequence":"first","affiliation":[]},{"given":"Huaglory","family":"Tianfield","sequence":"additional","affiliation":[]},{"given":"Daniela Elena","family":"Popescu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST definition of Cloud Computing. (online) National Institute of Standards and Technology (NIST) (2009), \n                    http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing\/cloud-def-v15.doc\n                   (accesssed October 2, 2010)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"11_CR2","unstructured":"Chen, X., Wills, G.B., Gilbert, L., Bacigalupo, D.: Using Cloud for Research: A Technical Review (online) JISC (2010), \n                    http:\/\/tecires.ecs.soton.ac.uk\/docs\/TeciRes_Technical_Report.pdf\n                   (accessed November 10, 2010)"},{"key":"11_CR3","volume-title":"Cloud Computing Implementation, Management and Security","author":"J.W. Rittinghouse","year":"2010","unstructured":"Rittinghouse, J.W., Ransome, J.F.: Cloud Computing Implementation, Management and Security. CRC Press, Boca Raton (2010)"},{"key":"11_CR4","unstructured":"CSA, Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 (online) Cloud Security Alliance (2009), \n                    http:\/\/www.cloudsecurityalliance.org\/csaguide.pdf\n                   (accessed October 14, 2010)"},{"key":"11_CR5","unstructured":"CPNI, Information Security Briefing Cloud Computing (online) Centre for the Protection of National Infrastructure (2010), \n                    http:\/\/www.cpni.gov.uk\/Docs\/cloud-computing-briefing.pdf\n                   (accessed October 2, 2010)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical Security Issues in Cloud Computing. In: IEEE International Conference on Cloud Computing (Cloud 2009), Bangalore, pp. 109\u2013116 (2009)","DOI":"10.1109\/CLOUD.2009.60"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Gruschka, N., Iacono, L.L.: Vulnerable Cloud: SOAP Message Security Validation Revisited. In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, pp. 625\u2013631 (2009)","DOI":"10.1109\/ICWS.2009.70"},{"key":"11_CR8","unstructured":"IBM, IBM Point of View: Security and Cloud Computing (online) (2009a), \n                    ftp:\/\/public.dhe.ibm.com\/common\/ssi\/ecm\/en\/tiw14045usen\/TIW14045USEN_HR.PDF\n                   (accessed October 2, 2010)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Kandukuri, B.R., Paturi, R.V., Rakshit, A.: Cloud Security Issues. In: IEEE International Conference on Services Computing, Bangalore, pp. 517\u2013520 (2009)","DOI":"10.1109\/SCC.2009.84"},{"key":"11_CR10","unstructured":"Andrei, T.: Cloud Computing Challenges and Related Security Issuess. A Survey Paper (online) (2009), \n                    http:\/\/www1.cse.wustl.edu\/~jain\/cse571-09\/ftp\/cloud\/index.html\n                   (accessed May 21, 2011)"},{"key":"11_CR11","unstructured":"Gruschka, N., Jensen, M.: Attack Surfaces: A taxonomy for Attacks on Cloud, vol. 5(7), (32) (2010), \n                    http:\/\/download.hakin9.org\/en\/Securing_the_Cloud_hakin9_07_2010.pdf\n                   (accessed October 20, 2010)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Ramgovind, S., Eloff, M.M., Smith, E.: The management of security in Cloud Computing. In: Information Security for South Africa (ISSA), pp. 1-7 (2010)","DOI":"10.1109\/ISSA.2010.5588290"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and Privacy in Cloud Computing: A Survey. In: 2010 Sixth International Conference on Semantics Knowledge and Grid (SKG), pp. 105\u2013112 (2010)","DOI":"10.1109\/SKG.2010.19"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Jing, X., Jian-Jun, Z.: A Brief Survey on the Security Model of Cloud Computing. In: 2010 Ninth International Symposium on Distributed Computing and Applications to Business Engineering and Science (DCABES), pp. 475\u2013478 (2010)","DOI":"10.1109\/DCABES.2010.103"},{"key":"11_CR15","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Petterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the Clouds: A Berkely View of Cloud Computing. Technical Report No. UCB\/EECS-2009-28, Berkely Electrical Engineering and Computing Science, University of California, Berkely (2009)"},{"key":"11_CR16","unstructured":"RSA, The Role of Security in Trustworthy Cloud Computing. White Paper (2009)"},{"key":"11_CR17","unstructured":"Identity Federation in a Hybrid Cloud Computing Environment Solution Guide, Juniper Networks, Inc. (online) (2009), \n                    http:\/\/www.juniper.net\/us\/en\/local\/pdf\/implementation-guides\/8010035-en.pdf\n                   (accessed February 20, 2011)"},{"issue":"3","key":"11_CR18","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MC.2011.60","volume":"44","author":"E. Olden","year":"2011","unstructured":"Olden, E.: Architecting a Cloud-Scale Identity Fabric. Computer\u00a044(3), 52\u201359 (2011)","journal-title":"Computer"},{"key":"11_CR19","unstructured":"Furlani, C.M.: Cloud Computing: Benefits and Risks of Moving Federal IT into the Cloud (online) National Institute of Standards and Technology, NIST (2010), \n                    http:\/\/www.nist.gov\/director\/ocla\/testimony\/upload\/Cloud-Computing-testimony-FINAL-with-Bio.pdf\n                   (accessed October 2, 2010)"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop, GCE 2008, pp. 1\u201310 (2008)","DOI":"10.1109\/GCE.2008.4738445"},{"key":"11_CR21","unstructured":"VMware and SAVVIS, Securing the Cloud A Review of Cloud Computing, Security Implications and Best Practices (online) VMware (2009), \n                    http:\/\/www.savvis.net\/en-US\/Info_Center\/Documents\/Savvis_VMW_whitepaper_0809.pdf\n                   (accessed October 15, 2010)"},{"issue":"1","key":"11_CR22","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MSP.2010.45","volume":"8","author":"T. Jaeger","year":"2010","unstructured":"Jaeger, T., Schiffman, J.: Outlook: Cloudy with a chance of Security Challenges and Improvements. IEEE Security & Privacy\u00a08(1), 77\u201380 (2010)","journal-title":"IEEE Security & Privacy"},{"key":"11_CR23","unstructured":"Cloud Computing Use Case Discussion Group, Cloud Computing Use Cases White Paper Version 4.0. (online) Cloud Computing Use Case Discussion Group (2010), \n                    http:\/\/opencloudmanifesto.org\/Cloud_Computing_Use_Cases_Whitepaper-4_0.pdf\n                   (accessed November 6, 2010)"},{"key":"11_CR24","unstructured":"McMillan, R.: Cisco CEO: Cloud Computing a \u2018Security nightmare (online) (2009), \n                    http:\/\/www.csoonline.com\/article\/490368\/cisco-ceo-cloud-computing-a-security-nightmare\n                   (accessed October 20, 2010)"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Shah, D., Patel, D.: Dynamic and Ubiquitous Security Architecture for Global SOA. In: The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, Valencia, Spain, pp. 482\u2013487 (2008)","DOI":"10.1109\/UBICOMM.2008.68"},{"key":"11_CR26","unstructured":"Geric, S.: Security of Web Services based Service-oriented Architectures. In: Proceeding of the 33rd International Convention, MIPRO 2010, Opatija, Croatia, pp. 1250\u20131255 (2010)"},{"issue":"3","key":"11_CR27","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/SURV.2009.090302","volume":"11","author":"N.A. Nordbotten","year":"2009","unstructured":"Nordbotten, N.A.: XML and Web Services Security Standards. IEEE Communications Surveys & Tutorials\u00a011(3), 4\u201321 (2009)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Sachdeva, S., Machome, S., Bhalla, S.: Web Services Security Issues in Healthcare Applications. In: 9th IEEE\/ACIS International Conference on Computer and Information Science (ICIS), Yamagata, pp. 91\u201396 (2010)","DOI":"10.1109\/ICIS.2010.134"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Douligeris, C., Ninios, G.P.: Security in Web Services. In: Dougligeris, C., Serpanos, D. (eds.) Network Security: Current Status and Future Directions, ch. 11, pp. 179\u2013204. Wiley, IEEE Press Publisher (2007)","DOI":"10.1002\/9780470099742.ch11"},{"key":"11_CR30","unstructured":"W3C, Web Services Architecture, W3C Working Group Note (online) World Wide Web Consortium (2004), \n                    http:\/\/www.w3.org\/TR\/ws-arch\/#id2260892\n                   (accessed January 20, 2011)"},{"key":"11_CR31","unstructured":"CA Software, CA SOA Security Manager: Securing SOA \/ Web Services Based IT Architectures (online) CA (2007), \n                    http:\/\/www.ca.com\/files\/technologybriefs\/34499-ca-soa-sm-tech-brf_162833.pdf\n                   (accessed February 17, 2011)"},{"key":"11_CR32","unstructured":"Wynn, R.: Securing the Cloud: Is it a Paradigm Shift in Information Security. Hacking IT Security Magazine\u00a05(7) (2010)"},{"key":"11_CR33","unstructured":"Wrenn, G.: CISSP, ISSEP, Unisys Secure Cloud Addressing the Top Threats of Cloud Computing, (online) (2010), White Paper, \n                    http:\/\/www.unisys.com\/unisys\/unisys\/inc\/pdf\/whitepapers\/38507380-000.pdf\n                   (accessed October 17, 2010)"},{"key":"11_CR34","unstructured":"CSA, Top Threats to Cloud Computing V1.0 (online) Cloud Security Alliance (2010), \n                    https:\/\/cloudsecurityalliance.org\/topthreats\/csathreats.v1.0.pdf\n                   (accessed July 27, 2011)"},{"key":"11_CR35","unstructured":"ENISA, Cloud Computing Bnefits, Risks and Recommendations for Information Security (online) European Network and Information Security Agency (2009), \n                    http:\/\/www.enisa.europa.eu\/act\/rm\/files\/deliverables\/cloud-computing-risk-assessment\/at_download\/fullReport\n                   (accessed July 27, 2011)"},{"key":"11_CR36","unstructured":"Jamil, D., Zaki, H.: Security Issues in Cloud Computing and Countermeasures. International Journal of Engineering Science and Technology (IJEST)\u00a03(4) (2011) ISSN: 0975-5462"},{"issue":"2","key":"11_CR37","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B. Grobauer","year":"2011","unstructured":"Grobauer, B., Walloschek, T., Stocker, E.: Understanding Cloud-Computing Vulnerabilities. IEEE Security & Privacy\u00a09(2), 50\u201357 (2011)","journal-title":"IEEE Security & Privacy"},{"key":"11_CR38","unstructured":"Elastic Security, Amazon EC2 \u2018broad character\u2019 support and Security impact on third party tools such as Elastic Detector (online), \n                    http:\/\/elastic-security.com\/2011\/02\/18\/amazon-ec2-broad-character-support-and-security-impact-on-third-party-tools-such-as-elastic-detector\/\n                   (accesssed July 30, 2011)"},{"key":"11_CR39","unstructured":"Cisco and VMware, DMZ Virtualization Using VMware vSphere 4 and the Cisco Nexus 1000V Virtual Switch (online) (2009), \n                    http:\/\/www.vmware.com\/files\/pdf\/dmz-vsphere-nexus-wp.pdf\n                   (accessed October 20, 2010)"},{"key":"11_CR40","unstructured":"Trend Micro, Cloud Computing Security (online) A Trend Micro White Paper (2009), \n                    http:\/\/www.whitestratus.com\/docs\/making-vms-cloud-ready.pdf\n                   (accessed October 20, 2010)"},{"key":"11_CR41","unstructured":"Discretix Technologies Ltd., n.d. Introduction to Side Channel Attacks (online), \n                    http:\/\/www.discretix.com\/PDF\/Introduction%20to%20Side%20Channel%20Attacks.pdf\n                   (accessed October 25, 2010)"},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Schacham, H., Savage, S.: Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party compute Clouds. In: ACM Conference on Computer and Communications Security, Chicago (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"11_CR43","unstructured":"CSA, Domain 12: Guidance for Identity & Access Management V2.1 (online) Cloud Security Alliance (2010b), \n                    http:\/\/www.cloudsecurityalliance.org\/guidance\/csaguide-dom12-v2.10.pdf\n                   (accessed November 3, 2010)"},{"key":"11_CR44","unstructured":"OASIS, Service Provisioning Markup Language (SPML) Version 1.0 (online) OASIS (2003a), \n                    http:\/\/www.oasis-open.org\/committees\/download.php\/4137\/os-pstc-spml-core-1.0.pdf\n                   (accessed November 4, 2010)"},{"key":"11_CR45","unstructured":"Harding, P.: State of Cloud Identity. In: 2nd Annual Cloud Identity Summit, San Francisco (2011)"},{"key":"11_CR46","unstructured":"Mortimore, C., Harding, P., Madsen, P., Smarr, J.: Simple Cloud Identity Management: Core Schema 1.0 \u2013draft1 (online) (2011), \n                    http:\/\/www.simplecloud.info\/specs\/draft-scim-core-schema-01.html\n                   (accessed September 10, 2011)"},{"issue":"5","key":"11_CR47","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MIC.2011.119","volume":"15","author":"L. Lynch","year":"2011","unstructured":"Lynch, L.: Inside the Identity Management Game. IEEE Internet Computing\u00a015(5), 78\u201382 (2011)","journal-title":"IEEE Internet Computing"},{"key":"11_CR48","unstructured":"Ping Identity, The Primer: Nuts and Bolts of Federated Identity Management White Paper (online) Ping Identity Corporation (2010a), \n                    http:\/\/secprodonline.com\/~\/media\/SEC\/Security%20Products\/Whitepapers\/2008\/06\/Ping%20Identity_WP_PrimerFIM%20pdf.ashx\n                   (accessed February 10, 2011)"},{"key":"11_CR49","unstructured":"Ping Identity, SAML 101 White paper (online) Ping Identity Corporation (2010b), \n                    https:\/\/www.pingidentity.com\/unprotected\/upload\/SAML-101.pdf\n                   (accesed February 10, 2011)"},{"key":"11_CR50","unstructured":"OASIS, Security Assertion Markup Language (SAML) V2.0 Technical Overview (online) OASIS (2008), \n                    http:\/\/www.oasis-open.org\/committees\/download.php\/20645\/sstc-saml-tech-overview-2%200-draft-10.pdf\n                   (accessed November 10, 2010)"},{"key":"11_CR51","unstructured":"Buecker, A., Ashley, P., Readshaw, N.: Federated Identity and Trust Management. International Bussiness Machines (IBM), Redpaper (2008)"},{"key":"11_CR52","unstructured":"OASIS, SAML V2.0 Executive Overview (online) OASIS (2005a), \n                    http:\/\/www.oasis-open.org\/committees\/download.php\/13525\/sstc-saml-exec-overview-2.0-cd-01-2col.pdf\n                   (accessed November 10, 2010)"},{"key":"11_CR53","unstructured":"Majava, J., Biasiol, A., Van der Maren, A.: Report on comparison and assessment of eID management solutions interoperability (online) European Communities (2007), \n                    http:\/\/ec.europa.eu\/idabc\/servlets\/Doceb29.pdf?id=29620\n                   (accessed February 10, 2011)"},{"key":"11_CR54","unstructured":"OAuth, n.d., OAuth Community Site (online), \n                    http:\/\/oauth.net\/\n                   (accessed September 10, 2011)"},{"key":"11_CR55","doi-asserted-by":"crossref","unstructured":"Wu, W., Zhang, H., Li, Z.: Open Social based Collaborative Science Gateways. In: 11th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 554\u2013559 (2011)","DOI":"10.1109\/CCGrid.2011.43"},{"key":"11_CR56","unstructured":"Sun Microsystems, Inc., Sun\u2019s XACML Implementation Programmer\u2019s Guide for Version 1.2 (online) Sun Microsystems (2004), \n                    http:\/\/sunxacml.sourceforge.net\/guide.html\n                   (accessed February 7, 2011)"},{"key":"11_CR57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87742-4","volume-title":"Security for Web Services and Service-Oriented Architecture","author":"E. Bertino","year":"2010","unstructured":"Bertino, E., Martino, L.D., Paci, E., Squicciarini, A.C.: Security for Web Services and Service-Oriented Architecture. Springer, Heidelberg (2010) ISBN 978-3-540-87741-7"},{"issue":"5","key":"11_CR58","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MITP.2010.98","volume":"12","author":"S. Lakshminarayanan","year":"2010","unstructured":"Lakshminarayanan, S.: Interoperable Security Standards for Web Services. IEEE IT Professional\u00a012(5), 42\u201347 (2010)","journal-title":"IEEE IT Professional"},{"key":"11_CR59","unstructured":"Goulding, J.T., Broberg, J., Gardiner, M.: Identity and access management for the cloud: CA\u2019s strategy and vision (online) CA, Inc., White paper (2010), \n                    http:\/\/www.ca.com\/files\/WhitePapers\/iam_cloud_security_vision_wp_236732.pdf\n                   (accessed August 11, 2011)"},{"key":"11_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S. Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications\u00a034, 1\u201311 (2011)","journal-title":"Journal of Network and Computer Applications"},{"key":"11_CR61","unstructured":"Fischer International Identity, LLC, Identity as a Service (IAAS) Technology, White paper (2009)"},{"key":"11_CR62","unstructured":"Fischer International Identity, LLC, Product Overview Introducing Fischer Identity, White paper (2009)"},{"key":"11_CR63","unstructured":"IBM Corporation, IBM Tivoli Access Management for Cloud and SOA environments (online) (2010), \n                    ftp:\/\/public.dhe.ibm.com\/common\/ssi\/ecm\/en\/tis14053usen\/TIS14053USEN_HR.PDF\n                   (accessed August 11, 2011)"},{"key":"11_CR64","doi-asserted-by":"crossref","unstructured":"Novell, Novell Cloud Security Service 1.0 SP2 (online) Novell (2011), \n                    http:\/\/www.novell.com\/documentation\/novellcloudsecurityservice\/\n                   (accessed May 21, 2011)","DOI":"10.1097\/ID.0b013e31824bf99f"},{"key":"11_CR65","unstructured":"Novell, Annexing the Cloud Novell Cloud Security Service (online) Novell (2010), \n                    http:\/\/www.asiacloudforum.com\/system\/files\/WP_Novell_annexing_cloud_security.pdf\n                   (accessed May 21, 2010)"}],"container-title":["Studies in Computational Intelligence","New Concepts and Applications in Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28959-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T23:14:00Z","timestamp":1674515640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28959-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642289583","9783642289590"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28959-0_11","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2013]]}}}