Skip to main content

Research Repository

Advanced Search

All Outputs (3)

Surveying the challenges and requirements for identity in the cloud (2014)
Conference Proceeding
Ben Bouazza, N., Lemoudden, M., & El Ouahidi, B. (2014). Surveying the challenges and requirements for identity in the cloud. In Proceedings of the 4th Edition of National Security Days (JNS4). https://doi.org/10.1109/jns4.2014.6850127

Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple prov... Read More about Surveying the challenges and requirements for identity in the cloud.

Identity federation scenarios for the cloud (2014)
Journal Article
Ben Bouazza, N., Lemoudden, M., El Ouahidi, B., & Bourget, D. (2014). Identity federation scenarios for the cloud. International Journal of Engineering and Technology (IJET), 6(2), 1290-1295

Traditional identity approaches in a cloud environment that demands scale and openness, suffer from a number of limits, especially when the enterprise uses multiple cloud service providers (CSPs) and user credentials are not shared with other provide... Read More about Identity federation scenarios for the cloud.

Towards achieving discernment and correlation in cloud logging (2014)
Presentation / Conference
Lemoudden, M. (2014, May). Towards achieving discernment and correlation in cloud logging. Paper presented at 13th International Conference on Software Engineering, Parallel and Distributed Systems (SEPADS14), Gdansk, Poland

Logs are of the most important pieces of analytical data in a cloud-based service infrastructure. IT actors, as well as security personnel, need access to information about user activity, authentication attempts and other security events for forensic... Read More about Towards achieving discernment and correlation in cloud logging.