Authorization Federation in IaaS Multi Cloud
|
|
|
- Berniece McLaughlin
- 10 years ago
- Views:
Transcription
1 Authorization Federation in IaaS Multi Cloud Navid Pustchi, Ram Krishnan and Ravi Sandhu SCC
2 Why Multi Cloud? Collaboration of organizations across clouds. Organizations with resources across multiple clouds. 2
3 Scope of Contribution Cloud Federation Service SaaS PaaS IaaS Platform Homogenous Heterogeneous Trust Circle-of-Trust Peer-to-Peer Coupling Authentication Federation Authorization Federation 3
4 Multi Cloud Collaboration Cloud Federation Service (IaaS, PaaS, SaaS) Heterogeneous: Google account (Open ID 2.0) Heterogeneous within google. Homogenous: Eduroam federated network access. Platform Trust Heterogeneous: OpenStack federation with AWS. Homogenous: Keystone to Keystone federation. Circle-of-Trust: Alliance of institutions for sharing scientific data such as CERN. Peer-to-Peer: Best Buy federating with Rackspace. Coupling Identity Federation: SAML, OAuth, OpenID, SSO. Authorization Federation: SAML, OAuth. 4
5 Trust Framework Trust Coupling Circle-of-Trust Peer-to-Peer Initiation Bilateral Unilateral Direction Bidirectional Unidirectional Transitivity Non-Transitive Transitive 5
6 Concept of Trust Four trust types: TTTTTTTT αα: (Trustor grants inter-cloud access to trustee) If AA αα BB, cloud AA is authorized to assign BB s users to cloud AA s resources. In such trust type, AA controls trust relation existence and cross-cloud assignments. TTTTTTTT ββ: (Trustee grants inter-cloud access to trustor) If AA ββ BB, cloud BB is authorized to assign AA s users to its resources. In such trust type, AA controls trust relation and BB controls cross-cloud assignments. TTTTTTTT γγ: (Trustee takes inter-cloud access to trustor) If AA γγ BB, cloud BB is authorized to assign its users to cloud AA s resources. In such trust type, AA controls trust relation and BB controls cross-cloud assignments. TTTTTTTT δδ: (Trustee controls intra-cloud access to trustor) If AA γγ BB, cloud BB is authorized to assign AA s users to AA s resources. In such trust type, AA controls trust relation and BB controls intra-cloud assignments within AA. 6
7 Administrative Realms 7
8 Multi Cloud Trust Three trust scopes based on administrative realms in cloud: Cross Cloud Trust Sharing cloud infrastructure resources, such as services. Cross Domain Trust Sharing domain resources such as projects. Cross Project Trust Sharing project resources such as VMs. 8
9 Cloud Trust Enables sharing cloud resources, services and domains. Set of domains shared between clouds with trust type (for domain trust). Sharing services by creating private domains for service allocation. Trust relation in Cloud Trust is Peer-to-Peer, bilateral, bidirectional, nontransitive. 9
10 Domain Trust Enabling cross cloud access by assigning users to PRPs between trusted domains. Trust relations are Peer-to-Peer, unilateral, unidirectional, non-transitive. DD AA DD AA ββ DD BB DD BB UU 1 UU 2 UU 3 UU 4 UU 5 UU 6 PPPPPP 1 PPPPPP 2 PPPPPP 3 PPPPPP 4 PPPPPP 5 PPPPPP 6 10
11 Project Trust Enabling cross cloud access to service instances by assigning users to PRPs between trusted projects. Trust relations are Peer-to-Peer, unilateral, unidirectional, non-transitive. DD AA PPPPPP 2 γγ PPPPPP 5 DD BB UU 1 UU 2 UU 3 UU 4 UU 5 UU 6 PPPPPP 1 PPPPPP 2 PPPPPP 3 PPPPPP 4 PPPPPP 5 PPPPPP 6 VVVV 1 VVVV 2 VVVV 3 VVVV 4 VVVV 5 VVVV 6 11
12 Related Work RBAC extensions ROBAC (collaboration ins not supported). GB-RBAC (group does own users). Role Based delegation models Delegation chains lacks dynamicity of trust in cloud federation environments. Multi-tenant trust models in single cloud. MT-RBAC (Multi-Tenant RBAC). CTTM (Cross Tenant Trust model). OSAC-DT (OpenStack Access Control with Domain Trust). 12
13 Conclusion & Future Work Multi-cloud trust model Cloud trust. Domain trust. Project trust. Trust framework & trust types Four types of trust applicable to administrative realms in cloud. Implementation in single cloud Partial implementation of domain-trust in single cloud OpenStack. Future Work Cloud trust implementation. Implementation in federated OpenStack clouds. Project trust implementation. Hierarchical multi-domain model. Attribute based models. 13
Institute for Cyber Security. A Multi-Tenant RBAC Model for Collaborative Cloud Services
Institute for Cyber Security A Multi-Tenant RBAC Model for Collaborative Cloud Services Bo Tang, Qi Li and Ravi Sandhu Presented by Bo Tang at The 11 th International Conference on Privacy, Security and
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
MULTI-TENANT ACCESS CONTROL FOR CLOUD SERVICES
MULTI-TENANT ACCESS CONTROL FOR CLOUD SERVICES APPROVED BY SUPERVISING COMMITTEE: Ravi Sandhu, Ph.D., Chair Kay A. Robbins, Ph.D. Gregory B. White, Ph.D. Weining Zhang, Ph.D. Jaehong Park, Ph.D. Accepted:
Extending OpenStack Access Control with Domain Trust
Extending OpenStack Access Control with Domain Trust Bo Tang and Ravi Sandhu Institute for Cyber Security and Department of Computer Science University of Texas at San Antonio, One UTSA Circle, San Antonio,
2 Authentication and identity management services in multi-platform cloud infrastructure
Abstract The security provision within multi-platform cloud computing environment is still considered not to be properly solved due to different problems with technical and humanbased origin. ICT users
Adding Federated Identity Management to OpenStack
Adding Federated Identity Management to OpenStack David Chadwick University of Kent 3 December 2012 University of Kent 1 Some Definitions What is Identity? A whole set of attributes that in combination
SECURE CLOUD COMPUTING
Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud
Cloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED CONCEPTUALIZATION MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED CONCEPTUALIZATION MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
CLOUD COMPUTING. When It's smarter to rent than to buy
CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit
Adding Federated Identity Management to Openstack
Adding Federated Identity Management to Openstack David Chadwick [email protected] 5 April 2014 Cloud Computing Security and Identity Workshop, NMOC 1 OpenStack Large open source project to develop
Cyber Incident Response
Secure Information Sharing for Cyber Response Teams Cyber Incident Response Models and Platforms for Information and Resource Sharing UTSA Team Ram Krishnan, Assistant Professor (ECE) Ravi Sandhu, Professor
Multi-tenancy authorization models for collaborative cloud services
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. (2014) Published online in Wiley Online Library (wileyonlinelibrary.com)..3446 SPECIAL ISSUE PAPER Multi-tenancy
Cloud Security. Let s Open the Box. Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research
t Cloud Security Let s Open the Box t Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research Facts about Ericsson Ericsson is a world-leading provider of telecommunication equipment and
Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service
Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Introduction to OpenStack
Introduction to OpenStack Carlo Vallati PostDoc Reseracher Dpt. Information Engineering University of Pisa [email protected] Cloud Computing - Definition Cloud Computing is a term coined to refer
SINGLE & SAME SIGN-ON ASPECTS
SINGLE & SAME SIGN-ON ASPECTS OF AZURE ACTIVE DIRECTORY Harold Baele Senior ICT Trainer JULY 2, 2015 SLIDE 1 TRAINER INFO Harold Baele MCT at RealDolmen Education [email protected] - @hbaele
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Transport SDN - Clearing the Roadblocks to Wide-scale Commercial
Transport SDN - Clearing the Roadblocks to Wide-scale Commercial Vishnu Shukla OIF President Verizon, USA OFC Los Angeles, March 25, 2015 Changing Role of Transport Networks A new kind of business customer
IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks
IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks Renato Figueiredo Advanced Computing and Information Systems Lab University of Florida ipop-project.org Unit 3: Intra-cloud Virtual Networks
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
Federated Identity for Cloud Computing and Cross-organization Collaboration
Federated Identity for Cloud Computing and Cross-organization Collaboration Steve Moitozo Strategy and Architecture SIL International 20110616.2 (ICCM) Follow me @SteveMoitozo2 2 Huge Claims You want federated
TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES
TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES APRIL 2-4, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) [email protected]
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
Interoperability & Portability for Cloud Computing: A Guide. http://www.cloud-council.org/cscc-cloud-interoperability-and-portability.
Interoperability & Portability for Computing: A Guide http://www.cloud-council.org/cscc--interoperability-and-portability.pdf December, 2014 The Standards Customer Council THE Customer s Voice for Standards!
It s All About Cloud Key Concepts, Players, Platforms And Technologies
It s All About Cloud Key Concepts, Players, Platforms And Technologies 3-day seminar Description Cloud computing has gained a lot of attention in recent years. It has mostly been used for non business
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
The Role of Identity Enabled Web Services in Cloud Computing
The Role of Identity Enabled Web Services in Cloud Computing April 20, 2009 Patrick Harding CTO Agenda Web Services and the Cloud Identity Enabled Web Services Some Use Cases and Case Studies Questions
Cloud Computing Standards: Overview and first achievements in ITU-T SG13.
Cloud Computing Standards: Overview and first achievements in ITU-T SG13. Dr ITU-T, Chairman of Cloud Computing Working Party, SG 13 Future Networks Orange Labs Networks, Cloud & Future Networks Standard
Security Architecture for Cloud Computing Platform
Security Architecture for Cloud Computing Platform SANJAYA DAHAL Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:291 Abstract Cloud computing is an innovation of existing technology
Identity and Access Management for the Cloud What You Need to Know About Managing Access to Your Clouds
Identity and Access Management for the Cloud What You Need to Know About Managing Access to Your Clouds Identity & Access Management One of the biggest challenges in information security is Identity and
Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud
Cloud Computing for Architects
Cloud Computing for Architects This four day, hands-on boot camp begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood
Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014
Introduction to Identity and Access Management for the engineers Radovan Semančík April 2014 How it works now? Manager Admin Login Users Login Admin Login Login Login Theory Manager Admin Forgot password
Third Party Cloud Services Its Adoption in the New Age
Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals
A Novel Cloud Hybrid Access Mechanism for Highly Sensitive Data Exchange
A Novel Cloud Hybrid Access Mechanism for Highly Sensitive Data Exchange Elhadj Benkhelifa Faculty of Computing, Eng and Sciences University of Staffordshire Staffordshire, UK e-mail: [email protected]
Enabling SSO for native applications
Enabling SSO for native applications Paul Madsen Ping Identity Session ID: IAM F42B Session Classification: Intermediate Mobile Modes Source - 'How to Connect with Mobile Consumers' Yahoo! Overview Enterprise
The Future of Cloud Identity Security. Michael Schwartz Founder / CEO Gluu
The Future of Cloud Identity Security Michael Schwartz Founder / CEO Gluu Session ID: IAM-207 Session Classification: General Interest Background 2 Finally an Internet Identity Foundation 3 Who is behind
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
SAVI/GENI Federation. Research Progress. Sushil Bhojwani, Andreas Bergen, Hausi A. Müller, Sudhakar Ganti University of Victoria.
SAVI/GENI Federation Research Progress Sushil Bhojwani, Andreas Bergen, Hausi A. Müller, Sudhakar Ganti University of Victoria. Canada Outline Introduction SAVI/GENI Federation objectives Work Involved
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014
Consumption IT Michael Shepherd Business Development Manager Cisco Public Sector May 1 st 2014 Short Bio Cloud BDM in Public Sector (SLED + FED) Cisco for 14 + years Focused on cloud for 4 + years Awareness,
Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
A.Prof. Dr. Markus Hagenbuchner [email protected]. CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1
A.Prof. Dr. Markus Hagenbuchner [email protected] CSCI319 A Brief Introduction to Cloud Computing CSCI319 Page: 1 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha
Abstract Cloud Broker * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Dept of ISE, The National Institute of Engineering, Mysore, India Cloud computing is kinetically evolving areas which
Domain 12: Guidance for Identity & Access Management V2.1
Domain 12: Guidance for Identity & Access Management V2.1 Prepared by the Cloud Security Alliance April 2010 Introduction The permanent and official location for this Cloud Security Alliance Domain 12
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
So#ware to Data model
So#ware to model Lenos Vacanas, Stelios So/riadis, Euripides Petrakis Technical University of Crete (TUC), Greece www.intelligence.tuc.gr Workshop on Adap-ve Resource Management and Scheduling for Cloud
What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection
Introduction What is Cloud Computing? Cloud computing means computing resources available on demand Resources can include storage, compute cycles, or software built on top (e.g. database as a service)
CliQr CloudCenter. Multi-Tenancy
CliQr CloudCenter Multi-Tenancy CliQr CloudCenter Multi-Tenancy and Multi-User Model Page 2 Table of Contents 1 Executive Summary...2 2 Introduction...3 3 Use Case: Application Onboarding...4 4 Use Case:
Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0
sm Open Data Center Alliance Usage: Identity Interoperability Guide rev. 1.0 Open Data Center Alliance Usage: Identity Interoperability Guide Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary...
TOP 7 THINGS Every Executive Should Know About Cloud Computing EXECUTIVE BRIEF
TOP 7 THINGS Every Executive Should Know About Cloud Computing EXECUTIVE BRIEF As interest in cloud computing increases, so does the confusion surrounding it. What is cloud computing? Can the technology
Cloud Computing. Chapter 5 Identity as a Service (IDaaS)
Cloud Computing Chapter 5 Identity as a Service (IDaaS) Learning Objectives Describe challenges related to ID management. Describe and discuss single sign-on (SSO) capabilities. List the advantages of
FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO ([email protected]) FULVIO VALENZA (fulvio.valenza@polito.
+ FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO ([email protected]) FULVIO VALENZA ([email protected]) + OUTLINE INTRODUCTION OF CLOUD DEFINITION OF CLOUD BASIC CLOUD COMPONENTS
Deploying Your Application On Public Cloud
#GHC14 Deploying Your Application On Public Cloud Egle Sigler @eglute Iccha Sethi @IcchaSethi October 9, Egle Sigler Principal Architect at Rackspace Works with OpenStack POWER: Professional Organization
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
Hybrid Cloud Identity and Access Management Challenges
Hybrid Cloud Identity and Access Management Challenges Intro: Timothy P. McAliley [email protected] Microsoft Premier Field Engineer, SQL Server, Washington, DC CISA, CISM, CISSP, ITIL V3,
Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud
Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud Cyber Incident Response An Model for Information and Resource Sharing Amy(Yun) Zhang, Farhan Patwa, Ravi Sandhu, Bo Tang
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment
A Requirements Analysis for IaaS Cloud Federation
A Requirements Analysis for IaaS Cloud Federation Alfonso Panarello, Antonio Celesti, Maria Fazio, Massimo Villari and Antonio Puliafito DICIEAMA, Università degli Studi di Messina, Contrada Di Dio, S.
Safewhere*Identify. Introduction. You just need one system for all your user on-boarding, admin and authentication
Safewhere*Identify Introduction You just need one system for all your user on-boarding, admin and authentication Contents Introducing Safewhere Identify... 3 Facebook, Google, Active Directory, one-time
Cloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah [email protected] Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
Cloud Computing. Technologies and Types
Cloud Computing Cloud Computing Technologies and Types Dell Zhang Birkbeck, University of London 2015/16 The Technological Underpinnings of Cloud Computing Data centres Virtualisation RESTful APIs Cloud
Iaas for Private and Public Cloud using Openstack
Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department
T-SYSTEMS Cloud STORY
Michael Moritz Lead Enterprise Architect Cloud Computing Cloud & Partner Sales - CTO Office T-Systems International GmbH Agenda Cloud Challenges T-Systems Cloud Strategy 2 Agenda Cloud Challenges T-Systems
OpenID Authentication As A Service in OpenStack
OpenID Authentication As A Service in OpenStack Rasib Hassan Khan**, Jukka Ylitalot and Abu Shohel Ahmed* *Aalto University, School of Science and Technology, Finland t Ericsson Research, Finland * Royal
Compliance and the Cloud: What You Can and What You Can t Outsource
Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Kate Donofrio Security Assessor Fortrex Technologies Instructor Biography Background On Fortrex What s In A Cloud? Pick
INDIGO-DataCloud Wupi 4 (Resource Virtualization)
INDIGO-DataCloud Wupi 4 (Resource Virtualization) All stolen from Markus, Enol, Maciej, Giacionto and many others High level objective This work package is focusing on virtualizing local computing, storage
Identity in the Cloud Use Cases Version 1.0
Identity in the Cloud Use Cases Version 1.0 Committee Note 01 08 May 2012 Specification URIs This version: http://docs.oasis-open.org/id-cloud/idcloud-usecases/v1.0/cn01/idcloudusecases-v1.0-cn01.pdf (Authoritative)
Unleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012
Unleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012 2 Who? Viktor van den Berg Consultant @ PQR Former Dutch VMUG Leader Blogger at www.viktorious.nl Twitter @viktoriousss
Amazon Web Services Demo Tech Exchange. Slides: http://goo.gl/mwz0es. [email protected]
Amazon Web Services Demo Tech Exchange Slides: http://goo.gl/mwz0es [email protected] $ dig +short emergency.iu.edu emergency.iu.edu.s3-website-us-east-1.amazonaws.com. s3-website-us-east-1.amazonaws.com. 54.231.14.220
The Challenges of Web single sign-on
Serge Vereecke Security Architect IBM Security Services [email protected] The Challenges of Web single sign-on GSE Event September 7, 2012 Agenda Single sign-on technology Why single sign-on Challenges
