Cloud Security
Moderator:
- Identity and Access in the Cloud 12.05.2011 14:00-15:00
-
Identity and Access in the CloudOrganizations are adopting IT services in the Cloud to reduce costs, but how does this change the way identity needs to be managed? This session describes how using the Cloud influences identity and access management within an organization. It explains the risks involved and describes best practices and technologies for managing these risks based on ISO 27001.
Architectural Patterns for the Intersection of IAM and Cloud Computing
- Cloud Identity and Security 12.05.2011 15:00-16:00
-
Cloud Identity and SecurityUsing Identity Management and Federation to establish a reliable and safe environment to use cloud offerings in today’s world.
Cloud Information Security and Compliance: How to keep Control over the Big Risks.The cloud brings enormous potential but also issues in the way IT must integrate Identity and access with interoperability with legacy systems. The enterprise must investigate service level agreements and deal with auditors and compliance. Cryptography plays a large role but how are keys and services used safely. This session discusses these issues and more with best practices guidance.
- Privacy Protected Authentication and Authorisation 12.05.2011 16:30-17:30
-
Privacy Protected Authentication and AuthorisationCardSpace in the Cloud describes a web based federated identity management system which is based on the user centric approach of the Information Card model, but has been significantly enhanced to remove many of the problems inherent in Microsoft’s original design. The new design is an alternative to UProve and Idemix credentials, and uses existing SAML 2 federations and assertions. Our model supports privacy protection of the user attributes, user mobility and the aggregation of...