The title deals with interpretation of basic rules of organising identification of users in information systems based on cloudy computing technologies, there are provided recommendations for developers, maintenance personnel and system administration.
cloudy computing, identification, information safety
1. Sychev A.V. Teoriya i praktika razrabotki sovremennyh klientskih veb-prilozheniy // Internet-universitet informacionnyh tehnologiy. URL: http://www.intuit.ru/department/internet/thpdevweba/24/thpdevweba_24.html (data obrascheniya: 04.12.2013).
2. Informacionnaya bezopasnost' pri oblachnyh vychisleniyah: problemy i perspektivy / M.Ya. Bekker [i dr.] // Nauchno-tehnicheskiy vestnik SPbGU ITMO. 2011. № 1 (71). S. 97-102.
3. Kim Cameron’s. Identity Weblog. URL: http://www.identityblog.com/stories/2004/12/09/ thelaws.html (data obrascheniya: 04.12.2013).