Enterprise Architecture Fundamentals

Richard Hill, Siavash Moshiri

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Abstract

With Cloud computing, the latest addition in system architecture, consumers and companies can scale up to massive capacities in an instant without having any investment in new infrastructure or they can even shrink to a desktop within a second. But this service-oriented computing is becoming controversial due to the lack of privacy and security issues. In a recent survey conducted by International Data Corporation (IDC), 87.5% of the participants suggested security as the main reason for reluctance on the part of enterprise IT to aggressively adopt Cloud computing in future system deployments. This chapter discusses a possible solution for Identity and Access Management (IAM) to help enterprise IT organizations and Cloud providers to improve their services. Managing access control and governance within IAM, to meet todays business needs in the Cloud environment, remains one of the major hurdles for enterprises adoption of Cloud services. Todays aggressive adoption of immature Cloud computing services by enterprises creates extreme thrust to have a strong Cloud-based IAM system which provides support for business needs ranging from secure collaborations with global partners to secure access for global employees consuming sensitive information, from any location and using any device at any time. The motive of this chapter is to show readers a standard possible way to develop an IAM system. This idea can work as seed for someone or a development/research group to come up with a complete full solution.
Original languageEnglish
Title of host publicationCloud Computing for Enterprise Architectures
EditorsZ. Mahmood, R. Hill
PublisherSpringer-Verlag London Limited
Pages21-41
Number of pages21
ISBN (Print)9781447122357
DOIs
Publication statusPublished - 2011
Externally publishedYes

Publication series

NameCloud Computing for Enterprise Architectures

Fingerprint

Industry
Cloud computing
Access control
Seed
Personnel

Cite this

Hill, R., & Moshiri, S. (2011). Enterprise Architecture Fundamentals. In Z. Mahmood, & R. Hill (Eds.), Cloud Computing for Enterprise Architectures (pp. 21-41). (Cloud Computing for Enterprise Architectures). Springer-Verlag London Limited. https://doi.org/10.1007/978-1-4471-2236-4_4
Hill, Richard ; Moshiri, Siavash. / Enterprise Architecture Fundamentals. Cloud Computing for Enterprise Architectures. editor / Z. Mahmood ; R. Hill. Springer-Verlag London Limited, 2011. pp. 21-41 (Cloud Computing for Enterprise Architectures).
@inbook{01cff8e354304476ae3367d4f433dac2,
title = "Enterprise Architecture Fundamentals",
abstract = "With Cloud computing, the latest addition in system architecture, consumers and companies can scale up to massive capacities in an instant without having any investment in new infrastructure or they can even shrink to a desktop within a second. But this service-oriented computing is becoming controversial due to the lack of privacy and security issues. In a recent survey conducted by International Data Corporation (IDC), 87.5{\%} of the participants suggested security as the main reason for reluctance on the part of enterprise IT to aggressively adopt Cloud computing in future system deployments. This chapter discusses a possible solution for Identity and Access Management (IAM) to help enterprise IT organizations and Cloud providers to improve their services. Managing access control and governance within IAM, to meet todays business needs in the Cloud environment, remains one of the major hurdles for enterprises adoption of Cloud services. Todays aggressive adoption of immature Cloud computing services by enterprises creates extreme thrust to have a strong Cloud-based IAM system which provides support for business needs ranging from secure collaborations with global partners to secure access for global employees consuming sensitive information, from any location and using any device at any time. The motive of this chapter is to show readers a standard possible way to develop an IAM system. This idea can work as seed for someone or a development/research group to come up with a complete full solution.",
keywords = "computer science",
author = "Richard Hill and Siavash Moshiri",
year = "2011",
doi = "10.1007/978-1-4471-2236-4_4",
language = "English",
isbn = "9781447122357",
series = "Cloud Computing for Enterprise Architectures",
publisher = "Springer-Verlag London Limited",
pages = "21--41",
editor = "Z. Mahmood and R. Hill",
booktitle = "Cloud Computing for Enterprise Architectures",

}

Hill, R & Moshiri, S 2011, Enterprise Architecture Fundamentals. in Z Mahmood & R Hill (eds), Cloud Computing for Enterprise Architectures. Cloud Computing for Enterprise Architectures, Springer-Verlag London Limited, pp. 21-41. https://doi.org/10.1007/978-1-4471-2236-4_4

Enterprise Architecture Fundamentals. / Hill, Richard; Moshiri, Siavash.

Cloud Computing for Enterprise Architectures. ed. / Z. Mahmood; R. Hill. Springer-Verlag London Limited, 2011. p. 21-41 (Cloud Computing for Enterprise Architectures).

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - Enterprise Architecture Fundamentals

AU - Hill, Richard

AU - Moshiri, Siavash

PY - 2011

Y1 - 2011

N2 - With Cloud computing, the latest addition in system architecture, consumers and companies can scale up to massive capacities in an instant without having any investment in new infrastructure or they can even shrink to a desktop within a second. But this service-oriented computing is becoming controversial due to the lack of privacy and security issues. In a recent survey conducted by International Data Corporation (IDC), 87.5% of the participants suggested security as the main reason for reluctance on the part of enterprise IT to aggressively adopt Cloud computing in future system deployments. This chapter discusses a possible solution for Identity and Access Management (IAM) to help enterprise IT organizations and Cloud providers to improve their services. Managing access control and governance within IAM, to meet todays business needs in the Cloud environment, remains one of the major hurdles for enterprises adoption of Cloud services. Todays aggressive adoption of immature Cloud computing services by enterprises creates extreme thrust to have a strong Cloud-based IAM system which provides support for business needs ranging from secure collaborations with global partners to secure access for global employees consuming sensitive information, from any location and using any device at any time. The motive of this chapter is to show readers a standard possible way to develop an IAM system. This idea can work as seed for someone or a development/research group to come up with a complete full solution.

AB - With Cloud computing, the latest addition in system architecture, consumers and companies can scale up to massive capacities in an instant without having any investment in new infrastructure or they can even shrink to a desktop within a second. But this service-oriented computing is becoming controversial due to the lack of privacy and security issues. In a recent survey conducted by International Data Corporation (IDC), 87.5% of the participants suggested security as the main reason for reluctance on the part of enterprise IT to aggressively adopt Cloud computing in future system deployments. This chapter discusses a possible solution for Identity and Access Management (IAM) to help enterprise IT organizations and Cloud providers to improve their services. Managing access control and governance within IAM, to meet todays business needs in the Cloud environment, remains one of the major hurdles for enterprises adoption of Cloud services. Todays aggressive adoption of immature Cloud computing services by enterprises creates extreme thrust to have a strong Cloud-based IAM system which provides support for business needs ranging from secure collaborations with global partners to secure access for global employees consuming sensitive information, from any location and using any device at any time. The motive of this chapter is to show readers a standard possible way to develop an IAM system. This idea can work as seed for someone or a development/research group to come up with a complete full solution.

KW - computer science

U2 - 10.1007/978-1-4471-2236-4_4

DO - 10.1007/978-1-4471-2236-4_4

M3 - Chapter

SN - 9781447122357

T3 - Cloud Computing for Enterprise Architectures

SP - 21

EP - 41

BT - Cloud Computing for Enterprise Architectures

A2 - Mahmood, Z.

A2 - Hill, R.

PB - Springer-Verlag London Limited

ER -

Hill R, Moshiri S. Enterprise Architecture Fundamentals. In Mahmood Z, Hill R, editors, Cloud Computing for Enterprise Architectures. Springer-Verlag London Limited. 2011. p. 21-41. (Cloud Computing for Enterprise Architectures). https://doi.org/10.1007/978-1-4471-2236-4_4