How to Adapt Authentication and Authorization Infrastructure of Applications for the Cloud | IEEE Conference Publication | IEEE Xplore