메뉴 건너뛰기




Volumn , Issue , 2011, Pages 110-115

A strong user authentication framework for cloud computing

Author keywords

Cloud computing; IAAS; OOB; PAAS; SAAS; User authentication; Virtualization

Indexed keywords

IAAS; OOB; PAAS; SAAS; USER AUTHENTICATION; VIRTUALIZATIONS;

EID: 84856543069     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/APSCC.2011.14     Document Type: Conference Paper
Times cited : (123)

References (29)
  • 3
    • 77949861819 scopus 로고    scopus 로고
    • whitepaper 1st edition, June or
    • "Introduction to Cloud Computing architecture", whitepaper 1st edition, June 2009, or http://webobjects.cdw.com/webobjects/media/pdf/Sun-Cloud- Computing.pdf.
    • (2009) Introduction to Cloud Computing Architecture
  • 4
    • 78349236138 scopus 로고    scopus 로고
    • Demystifying the cloud
    • viewed 13 December 2009
    • Global Netoptex Incorporated, 2009, demystifying the cloud. Important opportunities, crucial choices, http://www.gni.com, pp 4-14, viewed 13 December 2009.
    • (2009) Important Opportunities, Crucial Choices , pp. 4-14
  • 5
    • 77954945350 scopus 로고    scopus 로고
    • The information assurance practices of cloud computing vendors
    • R. Chakraborty, S. Ramireddy, T.S. Raghu, H. R. Rao, "The Information Assurance Practices of Cloud Computing Vendors". IT Professional, vol.12, 2010. pp.29-37.
    • (2010) IT Professional , vol.12 , pp. 29-37
    • Chakraborty, R.1    Ramireddy, S.2    Raghu, T.S.3    Rao, H.R.4
  • 6
    • 70749100039 scopus 로고    scopus 로고
    • Cloud computing: Will commodity services benefit users long term?
    • H. G. Miller and J. Veiga, "Cloud Computing: Will Commodity Services Benefit Users Long Term?" IT Professional, vol.11, 2010, Pp.29-37.
    • (2010) IT Professional , vol.11 , pp. 29-37
    • Miller, H.G.1    Veiga, J.2
  • 7
    • 77950653648 scopus 로고    scopus 로고
    • Hide and seek in the cloud
    • IEEE
    • M. S. Blumenthal, "Hide and Seek in the Cloud". Security & Privacy, IEEE, vol 8, 2010, Pp 57-58.
    • (2010) Security & Privacy , vol.8 , pp. 57-58
    • Blumenthal, M.S.1
  • 8
    • 80053153208 scopus 로고    scopus 로고
    • Ponemon Institute, Research Report, May
    • L. Ponemon, "Security of Cloud Computing Users," Ponemon Institute, Research Report, May 2010. http://www.ca.com/files/industryresearch/ security-cloud-computing-users-235659.pdf
    • (2010) Security of Cloud Computing Users
    • Ponemon, L.1
  • 9
    • 78349242824 scopus 로고    scopus 로고
    • New IDC IT cloud services survey: Top benefits and challenges
    • viewed 14 July 2011
    • F. Gens, 2009,' New IDC IT Cloud Services Survey: Top Benefits and Challenges', IDC eXchange, viewed 14 July 2011, http://blogs.idc.com/ie/?p=730.
    • (2009) IDC EXchange
    • Gens, F.1
  • 14
    • 71749119798 scopus 로고    scopus 로고
    • Access control of cloud services based on UCON
    • LNCS 5931
    • C. Danwei, H. Xiuli, and R. Xugyi, "Access control of cloud services based on UCON," CloudCom 2009, LNCS 5931, pp. 559-564, 2009.
    • (2009) CloudCom 2009 , pp. 559-564
    • Danwei, C.1    Xiuli, H.2    Xugyi, R.3
  • 15
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • L. Lamport, "Password authentication with insecure communication," Comm. ACM 24(11), Nov 1981, 770-771.
    • (1981) Comm. ACM , vol.24 , Issue.11 , pp. 770-771
    • Lamport, L.1
  • 16
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • M.S. Hwang, and L.H. Li, "A New Remote User Authentication Scheme using Smart Cards", IEEE Transactions on Consumer Electronics 46 (1) (2000) 28-30.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 17
    • 51849126082 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of two password authentication schemes with smart cards
    • INMIC IEEE International
    • M.K. Khan, "Cryptanalysis and Security Enhancement of Two Password Authentication Schemes with Smart Cards", Multitopic Conference, 2007. INMIC 2007. IEEE International.
    • (2007) Multitopic Conference, 2007
    • Khan, M.K.1
  • 18
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H.Y. Chien, J.K. Jan, Y.M. Tseng, "An efficient and practical solution to remote authentication: Smart card," Comput. Secur. 21 (4) (2002) 372-375.
    • (2002) Comput. Secur. , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 19
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • DOI 10.1016/j.jcss.2005.10.001, PII S0022000005001157
    • I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, "A password authentication scheme over insecure networks," J. Comput. System Sci. 72 (4) (2006) 727-740. (Pubitemid 44308160)
    • (2006) Journal of Computer and System Sciences , vol.72 , Issue.4 , pp. 727-740
    • Liao, I.-E.1    Lee, C.-C.2    Hwang, M.-S.3
  • 20
    • 4043072876 scopus 로고    scopus 로고
    • Efficient remote user authentication scheme based on generalized ElGamal signature scheme
    • May
    • E.J. Yoon, E.K. Ryu, K.Y. Yoo, "Efficient remote user authentication scheme based on generalized ElGamal signature scheme," IEEE Trans. Consum. Electron. 50 (2) (May 2004) 568-570.
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.2 , pp. 568-570
    • Yoon, E.J.1    Ryu, E.K.2    Yoo, K.Y.3
  • 21
    • 33744828520 scopus 로고    scopus 로고
    • New authentication scheme based on a one-way hash function and diffie-hellman key exchange
    • CANS 2005, LNCS Springer-Verlag
    • E.J. Yoon, K.Y. Yoo, "New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange," 4th International Conference of Cryptology and Network Security, CANS 2005, LNCS vol. 3810, Springer-Verlag, 2005, pp. 147-160.
    • (2005) 4th International Conference of Cryptology and Network Security , vol.3810 , pp. 147-160
    • Yoon, E.J.1    Yoo, K.Y.2
  • 22
    • 0032669728 scopus 로고    scopus 로고
    • Cryptanalysis of remote login authentication scheme
    • M.-S. Hwang, "Cryptanalysis of remote login authentication scheme," Comput. Commun. 22 (8) (1999). Pp. 742-744.
    • (1999) Comput. Commun. , vol.22 , Issue.8 , pp. 742-744
    • Hwang, M.-S.1
  • 23
    • 0000362936 scopus 로고    scopus 로고
    • An Improvement of SPLICE/AS in WIDE against Guessing Attack
    • M.-S. Hwang, C.-C. Lee, Y.-L. Tang, "An improvement of SPLICE/AS in WIDE against guessing attack," Internat. J. Inform. 12 (2) (2001). pp. 297-302. (Pubitemid 33675133)
    • (2001) Informatica , vol.12 , Issue.2 , pp. 297-302
    • Hwang, M.-S.1    Lee, C.-C.2    Tang, Y.-L.3
  • 24
    • 33645758252 scopus 로고    scopus 로고
    • Cryptanalysis of an id-based password authentication scheme using smart cards and fingerprints
    • M. Scott, "Cryptanalysis of an id-based password authentication scheme using smart cards and fingerprints," SIGOPS Oper. Syst. Rev. 38 (2) (2004). Pp. 73-75.
    • (2004) SIGOPS Oper. Syst. Rev. , vol.38 , Issue.2 , pp. 73-75
    • Scott, M.1
  • 25
    • 0242552288 scopus 로고    scopus 로고
    • Cryptanalysis of an enhanced timestamp-based password authentication scheme
    • B. Wang, J.H. Li, Z.P. Tong, "Cryptanalysis of an enhanced timestamp-based password authentication scheme," Comput. Secur. 22 (7) (2003). pp. 643-645.
    • (2003) Comput. Secur. , vol.22 , Issue.7 , pp. 643-645
    • Wang, B.1    Li, J.H.2    Tong, Z.P.3
  • 26
    • 33744828520 scopus 로고    scopus 로고
    • New authentication scheme based on a one-way hash function and diffie-hellman key exchange
    • CANS 2005, LNCS Springer-Verlag
    • E.J. Yoon, K.Y. Yoo, "New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange," 4th International Conference of Cryptology and Network Security, CANS 2005, LNCS, vol. 3810, Springer-Verlag, 2005, pp. 147-160.
    • (2005) 4th International Conference of Cryptology and Network Security , vol.3810 , pp. 147-160
    • Yoon, E.J.1    Yoo, K.Y.2
  • 27
    • 84947904235 scopus 로고    scopus 로고
    • Session key distribution using smartcards
    • LNCS Springer-Verlag
    • V. Shoup, A. Rubin, "Session key distribution using smartcards", in: Proc. EUROCRYPT 96, in: LNCS., vol 1070, Springer-Verlag, 1996, pp 321-333
    • (1996) Proc. EUROCRYPT 96 , vol.1070 , pp. 321-333
    • Shoup, V.1    Rubin, A.2
  • 28
    • 0001940580 scopus 로고
    • Provably secure session key distribution - The third party case
    • ACM, Las Vegas
    • M. Bellare, P. Rogaway, Provably secure session key distribution-The third party case, in: Proc. 27th ACM Symp. on Theory of Computing, ACM, Las Vegas, 1995, pp 57-66.
    • (1995) Proc. 27th ACM Symp. on Theory of Computing , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 29
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • G. Yang, D. S. Wong, H. Wang, X. Deng, "Two-factor mutual authentication based on smart cards and passwords", Journal of Computer and System Sciences, vol 74, 2008, Pp. 1160-1172.
    • (2008) Journal of Computer and System Sciences , vol.74 , pp. 1160-1172
    • Yang, G.1    Wong, D.S.2    Wang, H.3    Deng, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.