-
2
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
September
-
B. C. Neuman and T. Ts'o. Kerberos: An Authentication Service for Computer Networks. In IEEE Communications, 32(9):33-38, September 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
4
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, vol. 21, no. 12, pages 993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
5
-
-
0000874415
-
Limitations of the Kerberos authentication system
-
S. M. Bellovin and M. Merritt. Limitations of the Kerberos authentication system. SIGCOMM Comput. Commun. Rev., vol. 20, no. 5, pages 119-132, 1990.
-
(1990)
SIGCOMM Comput. Commun. Rev.
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
0033605501
-
Inter-protocol interleaving attacks on some authentication and key distribution protocols
-
T. Wen-Guey and H. Chi-Ming. Inter-protocol interleaving attacks on some authentication and key distribution protocols. Information Processing Letters, vol. 69, no. 6, pages 297-302, 1999.
-
(1999)
Information Processing Letters
, vol.69
, Issue.6
, pp. 297-302
-
-
Wen-Guey, T.1
Chi-Ming, H.2
-
8
-
-
34547448344
-
OpenID 2.0: A platform for user-centric identity management
-
New York, NY, USA, ACM Press
-
D. Recordon and D. Reed. OpenID 2.0: a platform for user-centric identity management. In DIM'06: Proceedings of the second ACM workshop on Digital identity management, pages 11-16, New York, NY, USA, 2006. ACM Press.
-
(2006)
DIM'06: Proceedings of the Second ACM Workshop on Digital Identity Management
, pp. 11-16
-
-
Recordon, D.1
Reed, D.2
-
12
-
-
80054826453
-
SeDiCi: An authentication service taking advantage of zero-knowledge proofs
-
Springer
-
S. Grzonkowski. SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs. In Financial Cryptography. Springer, 2010
-
(2010)
Financial Cryptography
-
-
Grzonkowski, S.1
-
14
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
15 January
-
S. Subashini, V. Kavitha, "A survey on security issues in service delivery models of cloud computing" in Journal of Network and Computer Applications, Vol. 34, no. 1. (15 January 2011), pp. 1-11.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
15
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM, New York, NY, USA
-
T., Ristenpart, E., Tromer, H., Shacham, and S., Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security (CCS'09). ACM, New York, NY, USA, 199-212, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
16
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
ACM, New York, NY, USA
-
R., Chow, P., Golle, M. Jakobsson, E., Shi, J., Staddon, R., Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW'09). ACM, New York, NY, USA, 85-90, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW'09)
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
17
-
-
70349309706
-
-
Security & Privacy, IEEE, July-Aug
-
L. M., Kaufman;, Data Security in the World of Cloud Computing, Security & Privacy, IEEE, vol. 7, no. 4, pp. 61-64, July-Aug. 2009
-
(2009)
Data Security in the World of Cloud Computing
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.M.1
-
18
-
-
77950347409
-
A view of cloud computing
-
April 2010
-
M., Armbrust, A., Fox, R., Griffith, A. D., Joseph, R., Katz, A., Konwinski, G., Lee, D., Patterson, A., Rabkin, I., Stoica, and M., Zaharia. 2010. A view of cloud computing. Commun. ACM 53, 4(April 2010), 50-58.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
19
-
-
79952440250
-
Architectural requirements for cloud computing systems: An enterprise cloud approach
-
March
-
B. P., Rimal, A., Jukan, D., Katsaros and Y. Goeleven, Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach, Journal of Grid Computing, Volume 9, Number 1, (March 2011) pp. 3-26.
-
(2011)
Journal of Grid Computing
, vol.9
, Issue.1
, pp. 3-26
-
-
Rimal, B.P.1
Jukan, A.2
Katsaros, D.3
Goeleven, Y.4
-
20
-
-
80054829445
-
-
21-25 Sept
-
J., Schwenk, N. Gruschka, L. Iacono;, On Technical Security Issues in Cloud Computing, Cloud Computing, 2009. CLOUD'09. IEEE International Conference on, vol., no., pp. 109-116, 21-25 Sept. 2009
-
(2009)
On Technical Security Issues in Cloud Computing, Cloud Computing, 2009. CLOUD'09. IEEE International Conference on
, pp. 109-116
-
-
Schwenk, J.1
Gruschka, N.2
Iacono, L.3
-
21
-
-
70449569012
-
-
13-15 July
-
Cong Wang; Qian Wang; Kui Ren; Wenjing Lou;, Ensuring data storage security in Cloud Computing, Quality of Service, 2009. IWQoS. 17th International Workshop on, vol., no., pp. 1-9, 13-15 July 2009
-
(2009)
Ensuring Data Storage Security in Cloud Computing, Quality of Service, 2009. IWQoS. 17th International Workshop on
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
23
-
-
51849153945
-
Beamauth: Two-factor web authentication with a bookmark
-
New York, NY, USA, ACM
-
B. Adida. Beamauth: two-factor web authentication with a bookmark. In CCS'07: Proceedings of the 14th ACM conference on Computer and communications security, pages 48-57, New York, NY, USA, 2007. ACM.
-
(2007)
CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 48-57
-
-
Adida, B.1
|