Amjad Alsirhani, Mohamed Ezz, Ayman Mohamed Mostafa*
Computer Systems Science and Engineering, Vol.43, No.3, pp. 967-984, 2022, DOI:10.32604/csse.2022.024854
- 09 May 2022
Abstract Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security… More >