{"id":"https://openalex.org/W2130017644","doi":"https://doi.org/10.5539/cis.v6n2p126","title":"Centralized Access Management and Monitoring as a Service in Cloud Environments-A Critical Study","display_name":"Centralized Access Management and Monitoring as a Service in Cloud Environments-A Critical Study","publication_year":2013,"publication_date":"2013-04-26","ids":{"openalex":"https://openalex.org/W2130017644","doi":"https://doi.org/10.5539/cis.v6n2p126","mag":"2130017644"},"language":"en","primary_location":{"id":"doi:10.5539/cis.v6n2p126","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v6n2p126","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/18736/16422","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ccsenet.org/journal/index.php/cis/article/download/18736/16422","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010168234","display_name":"Ajay Prasad","orcid":"https://orcid.org/0000-0002-2672-2234"},"institutions":[{"id":"https://openalex.org/I74885063","display_name":"Sharda University","ror":"https://ror.org/03b6ffh07","country_code":"IN","type":"education","lineage":["https://openalex.org/I74885063"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ajay Prasad","raw_affiliation_strings":["Sharda University, Greater Noida, India","SHARDA UNIVERSITY"],"affiliations":[{"raw_affiliation_string":"Sharda University, Greater Noida, India","institution_ids":["https://openalex.org/I74885063"]},{"raw_affiliation_string":"SHARDA UNIVERSITY","institution_ids":["https://openalex.org/I74885063"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068867070","display_name":"Prasun Chakrabarty","orcid":null},"institutions":[{"id":"https://openalex.org/I94511900","display_name":"Sir Padampat Singhania University","ror":"https://ror.org/03mhsvf98","country_code":"IN","type":"education","lineage":["https://openalex.org/I94511900"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prasun Chakrabarty","raw_affiliation_strings":["Sir Padampat Singhania University, Udaipur, India"],"affiliations":[{"raw_affiliation_string":"Sir Padampat Singhania University, Udaipur, India","institution_ids":["https://openalex.org/I94511900"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5010168234"],"corresponding_institution_ids":["https://openalex.org/I74885063"],"apc_list":null,"apc_paid":null,"fwci":1.6711,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.89217523,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8076494932174683},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7684125900268555},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.6763277053833008},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.6205798387527466},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5593626499176025},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5471996665000916},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5405427813529968},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4930512607097626},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.4906059801578522},{"id":"https://openalex.org/keywords/access-management","display_name":"Access management","score":0.4673103988170624},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3711996376514435},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.23631104826927185},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.2115066647529602},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10869181156158447},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08846795558929443},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.08695316314697266}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8076494932174683},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7684125900268555},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.6763277053833008},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.6205798387527466},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5593626499176025},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5471996665000916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5405427813529968},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4930512607097626},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.4906059801578522},{"id":"https://openalex.org/C2778002324","wikidata":"https://www.wikidata.org/wiki/Q4488810","display_name":"Access management","level":2,"score":0.4673103988170624},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3711996376514435},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.23631104826927185},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2115066647529602},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10869181156158447},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08846795558929443},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.08695316314697266},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5539/cis.v6n2p126","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v6n2p126","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/18736/16422","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.898.5935","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.898.5935","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ccsenet.org/journal/index.php/cis/article/download/18736/16422/","raw_type":"text"}],"best_oa_location":{"id":"doi:10.5539/cis.v6n2p126","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v6n2p126","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/18736/16422","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5299999713897705,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2130017644.pdf","grobid_xml":"https://content.openalex.org/works/W2130017644.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1493685038","https://openalex.org/W1662910393","https://openalex.org/W2015958088","https://openalex.org/W2045287414","https://openalex.org/W2073511948","https://openalex.org/W2074769682","https://openalex.org/W2101696106","https://openalex.org/W2116626915","https://openalex.org/W2146914811","https://openalex.org/W2154107289","https://openalex.org/W2156233985","https://openalex.org/W2157040323","https://openalex.org/W2165464232","https://openalex.org/W2177802445","https://openalex.org/W2185006567","https://openalex.org/W2915118208","https://openalex.org/W4211076988"],"related_works":["https://openalex.org/W4310934770","https://openalex.org/W2614795314","https://openalex.org/W4252422028","https://openalex.org/W1564746865","https://openalex.org/W2501813002","https://openalex.org/W4220879304","https://openalex.org/W2364256422","https://openalex.org/W1527406081","https://openalex.org/W4247435446","https://openalex.org/W3204388859"],"abstract_inverted_index":{"The":[0,30,49],"aspect":[1],"of":[2,19,33,40,73],"virtualization":[3],"and":[4,42,47,103],"large":[5],"scale":[6],"distribution":[7],"has":[8],"brought":[9],"forward":[10],"the":[11,20,38,57,96,109],"cloud":[12,58],"computing":[13],"phenomenon.":[14],"Despite":[15],"its":[16,67],"popularity,":[17],"most":[18],"enterprises":[21],"are":[22],"still":[23],"circumspect":[24],"in":[25,56,79],"getting":[26],"into":[27],"clouds":[28],"completely.":[29],"major":[31],"part":[32],"this":[34],"circumspection":[35],"owes":[36],"to":[37,65,85],"factors":[39],"identity":[41],"access":[43,51,93,101],"management,":[44],"monitoring,":[45],"auditing":[46],"reporting.":[48],"traditional":[50],"management":[52,94,102],"will":[53,76,82],"not":[54],"suffice":[55],"context":[59],"naturally.":[60],"Also,":[61],"every":[62],"enterprise":[63,97],"needs":[64],"monitor":[66],"employees":[68],"as":[69,71,105],"well":[70],"usage":[72],"services":[74],"which":[75,98],"also":[77],"assist":[78],"auditing.":[80],"It":[81],"be":[83],"better":[84],"have":[86],"centralized":[87,92],"monitoring":[88,104],"clubbed":[89],"with":[90,100],"a":[91,106],"at":[95,108],"coordinates":[99],"service":[107],"provider.":[110]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
