Enterprise Architecture Fundamentals

Richard Hill, Siavash Moshiri

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review


With Cloud computing, the latest addition in system architecture, consumers and companies can scale up to massive capacities in an instant without having any investment in new infrastructure or they can even shrink to a desktop within a second. But this service-oriented computing is becoming controversial due to the lack of privacy and security issues. In a recent survey conducted by International Data Corporation (IDC), 87.5% of the participants suggested security as the main reason for reluctance on the part of enterprise IT to aggressively adopt Cloud computing in future system deployments. This chapter discusses a possible solution for Identity and Access Management (IAM) to help enterprise IT organizations and Cloud providers to improve their services. Managing access control and governance within IAM, to meet todays business needs in the Cloud environment, remains one of the major hurdles for enterprises adoption of Cloud services. Todays aggressive adoption of immature Cloud computing services by enterprises creates extreme thrust to have a strong Cloud-based IAM system which provides support for business needs ranging from secure collaborations with global partners to secure access for global employees consuming sensitive information, from any location and using any device at any time. The motive of this chapter is to show readers a standard possible way to develop an IAM system. This idea can work as seed for someone or a development/research group to come up with a complete full solution.
Original languageEnglish
Title of host publicationCloud Computing for Enterprise Architectures
EditorsZ. Mahmood, R. Hill
PublisherSpringer-Verlag London Limited
Number of pages21
ISBN (Print)9781447122357
Publication statusPublished - 2011
Externally publishedYes

Publication series

NameCloud Computing for Enterprise Architectures


Dive into the research topics of 'Enterprise Architecture Fundamentals'. Together they form a unique fingerprint.

Cite this