-
1
-
-
84863676024
-
Draft cloud computing synopsis and recommendations
-
L. Badger, T. Grance, R. Patt-Corner, and J. Voas, "Draft cloud computing synopsis and recommendations," NIST Special Publication, vol. 800, p. 146, 2011.
-
(2011)
NIST Special Publication
, vol.800
, pp. 146
-
-
Badger, L.1
Grance, T.2
Patt-Corner, R.3
Voas, J.4
-
2
-
-
84874257313
-
-
S. T. Sun, E. Pospisil, I. Muslukhov, N. Dindar, K. Hawkey, and K. Beznosov, "What makes users refuse web single sign-on?: an empirical investigation of OpenID," 2011, p. 4.
-
(2011)
What Makes Users Refuse Web Single Sign-on?: An Empirical Investigation of OpenID
, pp. 4
-
-
Sun, S.T.1
Pospisil, E.2
Muslukhov, I.3
Dindar, N.4
Hawkey, K.5
Beznosov, K.6
-
3
-
-
84874256125
-
-
M. Gharooni, M. Zamani, M. Mansourizadeh, and S. Abdullah, "A confidential RFID model to prevent unauthorized access," 2011, pp. 1-5.
-
(2011)
A Confidential RFID Model to Prevent Unauthorized Access
, pp. 1-5
-
-
Gharooni, M.1
Zamani, M.2
Mansourizadeh, M.3
Abdullah, S.4
-
4
-
-
84874279146
-
-
M. ALIZADEH, M. SALLEH, M. ZAMANI, J. SHAYAN, and S. KARAMIZADEH, "Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID."
-
Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID
-
-
Alizadeh, M.1
Salleh, M.2
Zamani, M.3
Shayan, J.4
Karamizadeh, S.5
-
5
-
-
84867017590
-
-
A. C. Armando, R. Compagna, L. Cuellar, J. Tobarra, L., "Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps," 2008, pp. 1-10.
-
(2008)
Formal Analysis of SAML 2.0 Web Browser Single Sign-on: Breaking the SAML-based Single Sign-on for Google Apps
, pp. 1-10
-
-
Armando, A.C.1
Compagna, R.2
Cuellar, L.3
Tobarra, L.J.4
-
7
-
-
77954927272
-
Identity federation broker for service cloud
-
May 12, 2010-May 14, 2010, Hangzhou, China
-
H. Y. Huang, B. Wang, X. X. Liu, and J. M. Xu, "Identity federation broker for service cloud," in 2010 International Conference on Service Sciences, ICSS 2010, May 12, 2010-May 14, 2010, Hangzhou, China, 2010, pp. 115-120.
-
(2010)
2010 International Conference on Service Sciences, ICSS 2010
, pp. 115-120
-
-
Huang, H.Y.1
Wang, B.2
Liu, X.X.3
Xu, J.M.4
-
9
-
-
84874269961
-
Security guidance for critical areas of focus in cloud computing v3.0
-
D. C. J. Archer, Nils Puhlmann, Alan Boehme, Paul Kurtz, and J. Reavis, "Security guidance for critical areas of focus in cloud computing v3.0," Cloud Security Alliance, 2011.
-
(2011)
Cloud Security Alliance
-
-
Archer, D.C.J.1
Puhlmann, N.2
Boehme, A.3
Kurtz, P.4
Reavis, J.5
-
10
-
-
84883315584
-
-
J. Somorovsky, A. Mayer, J. Schwenk, M. Kampmann, and M. Jensen, "On breaking saml: Be whoever you want to be," 2012.
-
(2012)
On Breaking Saml: Be Whoever You Want to Be
-
-
Somorovsky, J.1
Mayer, A.2
Schwenk, J.3
Kampmann, M.4
Jensen, M.5
-
12
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identitybased cryptography
-
December 1, 2009-December 4, 2009, Beijing, China
-
L. Yan, C. Rong, and G. Zhao, "Strengthen cloud computing security with federal identity management using hierarchical identitybased cryptography," in 1st International Conference on Cloud Computing, CloudCom 2009, December 1, 2009-December 4, 2009, Beijing, China, 2009, pp. 167-177.
-
(2009)
1st International Conference on Cloud Computing, CloudCom 2009
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
-
17
-
-
84891065445
-
-
M. A. P. Leandro, T. J. Nascimento, D. R. dos Santos, C. M. Westphall, and C. B. Westphall, "Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth," 2012, pp. 88-93.
-
(2012)
Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth
, pp. 88-93
-
-
Leandro, M.A.P.1
Nascimento, T.J.2
Dos Santos, D.R.3
Westphall, C.M.4
Westphall, C.B.5
-
20
-
-
59249091249
-
A user-centric federated single sign-on system
-
S. Suriadi, E. Foo, and A. Jøsang, "A user-centric federated single sign-on system," Journal of Network and Computer Applications, vol. 32, pp. 388-401, 2009.
-
(2009)
Journal of Network and Computer Applications
, vol.32
, pp. 388-401
-
-
Suriadi, S.1
Foo, E.2
Jøsang, A.3
|