{"id":"https://openalex.org/W2134048408","doi":"https://doi.org/10.1109/isias.2010.5604074","title":"Identity federation in cloud computing","display_name":"Identity federation in cloud computing","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W2134048408","doi":"https://doi.org/10.1109/isias.2010.5604074","mag":"2134048408"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2010.5604074","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604074","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012994834","display_name":"Valentina Casola","orcid":"https://orcid.org/0000-0003-0964-7014"},"institutions":[{"id":"https://openalex.org/I71267560","display_name":"University of Naples Federico II","ror":"https://ror.org/05290cv24","country_code":"IT","type":"education","lineage":["https://openalex.org/I71267560"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Valentina Casola","raw_affiliation_strings":["Dipartimento di Informatica e Sistemistica, Universit\u00e0 degli Studi di Napoli Federico II, Italy","Dipartimento di Informatica e Sistemistica, Universit\u00e0 degli Studi di Napoli Federico II, , Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica e Sistemistica, Universit\u00e0 degli Studi di Napoli Federico II, Italy","institution_ids":["https://openalex.org/I71267560"]},{"raw_affiliation_string":"Dipartimento di Informatica e Sistemistica, Universit\u00e0 degli Studi di Napoli Federico II, , Italy","institution_ids":["https://openalex.org/I71267560"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068111307","display_name":"Massimiliano Rak","orcid":"https://orcid.org/0000-0001-6708-4032"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Massimiliano Rak","raw_affiliation_strings":["Dipartimento di Ingegneria dell'Informazione, Seconda Universit\u00e0 di Napoli, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Ingegneria dell'Informazione, Seconda Universit\u00e0 di Napoli, Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053986858","display_name":"Umberto Villano","orcid":"https://orcid.org/0000-0001-5382-4650"},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Umberto Villano","raw_affiliation_strings":["Dipartimento di Ingegneria, Universit\u00e0 del Sannio, Italy","Dipartimento di Ingegneria; Universit\u00e0 del Sannio; Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Ingegneria, Universit\u00e0 del Sannio, Italy","institution_ids":["https://openalex.org/I16337185"]},{"raw_affiliation_string":"Dipartimento di Ingegneria; Universit\u00e0 del Sannio; Italy","institution_ids":["https://openalex.org/I16337185"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012994834"],"corresponding_institution_ids":["https://openalex.org/I71267560"],"apc_list":null,"apc_paid":null,"fwci":3.5612,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.93258876,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"15","issue":null,"first_page":"253","last_page":"259"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8650645613670349},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8187201023101807},{"id":"https://openalex.org/keywords/grid-computing","display_name":"Grid computing","score":0.6883107423782349},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.6301122903823853},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5880983471870422},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5665839314460754},{"id":"https://openalex.org/keywords/utility-computing","display_name":"Utility computing","score":0.5372599959373474},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5263382792472839},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.48785901069641113},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4797414541244507},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.4596500098705292},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4565976560115814},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.19509997963905334},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1759689748287201}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8650645613670349},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8187201023101807},{"id":"https://openalex.org/C70429105","wikidata":"https://www.wikidata.org/wiki/Q249999","display_name":"Grid computing","level":3,"score":0.6883107423782349},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.6301122903823853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5880983471870422},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5665839314460754},{"id":"https://openalex.org/C85106507","wikidata":"https://www.wikidata.org/wiki/Q1188445","display_name":"Utility computing","level":4,"score":0.5372599959373474},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5263382792472839},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.48785901069641113},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4797414541244507},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.4596500098705292},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4565976560115814},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.19509997963905334},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1759689748287201},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2010.5604074","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604074","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W180090496","https://openalex.org/W202238108","https://openalex.org/W1413397963","https://openalex.org/W1483347125","https://openalex.org/W1492484099","https://openalex.org/W1492522106","https://openalex.org/W1555993967","https://openalex.org/W1590665309","https://openalex.org/W1974455596","https://openalex.org/W2019506786","https://openalex.org/W2028706992","https://openalex.org/W2105372142","https://openalex.org/W2116876232","https://openalex.org/W2124912619","https://openalex.org/W2128765900","https://openalex.org/W2131726714","https://openalex.org/W2146795968","https://openalex.org/W2275530856","https://openalex.org/W3148640261","https://openalex.org/W6607416027","https://openalex.org/W6628335548","https://openalex.org/W6628650237","https://openalex.org/W6629294157","https://openalex.org/W6629591065","https://openalex.org/W6635429221","https://openalex.org/W6675730327","https://openalex.org/W6694821995"],"related_works":["https://openalex.org/W2337331320","https://openalex.org/W2359083166","https://openalex.org/W1585052355","https://openalex.org/W4297792185","https://openalex.org/W4322712946","https://openalex.org/W4229574277","https://openalex.org/W2038726588","https://openalex.org/W2125771852","https://openalex.org/W2363418456","https://openalex.org/W2992164351"],"abstract_inverted_index":{"Both":[0],"cloud":[1,47,80,116],"and":[2,24,81,104],"GRID":[3,54,82,107,122],"are":[4],"computing":[5],"paradigms":[6],"for":[7],"the":[8,16,25,45,53,68,72,77,87,98,101,105],"large-scale":[9],"management":[10],"of":[11,35,79,89],"distributed":[12],"resources.":[13],"Even":[14],"if":[15],"first":[17],"is":[18,32,41,50,70,85,111],"usually":[19],"oriented":[20],"to":[21,27,56,63,76,96],"transaction-based":[22],"applications,":[23],"latter":[26],"High":[28],"Performance":[29],"Computation,":[30],"there":[31],"a":[33,115],"lot":[34],"interest":[36],"in":[37,52],"their":[38],"integration.":[39],"This":[40,109],"typically":[42],"obtained":[43],"through":[44],"Infrastructure-as-a-Service":[46],"model,":[48],"which":[49],"exploited":[51],"context":[55],"offer":[57],"machine":[58],"with":[59],"full":[60],"administration":[61],"rights":[62],"users.":[64],"In":[65],"this":[66],"paper":[67],"focus":[69],"on":[71],"security":[73,94],"problems":[74],"linked":[75],"integration":[78],"computing.":[83],"It":[84],"proposed":[86],"adoption":[88],"identify":[90],"federation":[91],"between":[92,100],"different":[93],"domains":[95],"manage":[97],"relationship":[99],"user":[102],"machines":[103],"standard":[106],"infrastructure.":[108],"solution":[110],"experimented":[112],"within":[113],"PerfCloud,":[114],"implementation":[117],"that":[118],"exploits":[119],"an":[120],"underlying":[121],"platform.":[123]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
