메뉴 건너뛰기




Volumn 16, Issue 4, 2013, Pages 905-914

Software Service Signature (S3) for authentication in cloud computing

Author keywords

Authentication; Cloud computing; Security; Software as a Service; Software Service Signature

Indexed keywords

APPLICATION PROGRAMS; AUTHENTICATION; CLOUD COMPUTING; NETWORK SECURITY; WEB SERVICES;

EID: 84888848223     PISSN: 13867857     EISSN: 15737543     Source Type: Journal    
DOI: 10.1007/s10586-013-0262-y     Document Type: Article
Times cited : (7)

References (23)
  • 2
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586-615 (2003).
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 4
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • LNCS, Berlin: Springer
    • Choon, C. J., Hee, C. J.: An identity-based signature from gap Diffie-Hellman groups. In: Public Key Cryptography-PKC 2003. LNCS, vol. 2139, pp. 18-30. Springer, Berlin (2002).
    • (2002) Public Key Cryptography-PKC 2003 , vol.2139 , pp. 18-30
    • Choon, C.J.1    Hee, C.J.2
  • 5
    • 84888847648 scopus 로고    scopus 로고
    • Ontology as a service (oaas): extracting and replacing sub-ontologies on the cloud
    • doi: 10. 1007/s10586-012-0231-x
    • Flahive, A., Taniar, D., Rahayu, W: Ontology as a service (oaas): extracting and replacing sub-ontologies on the cloud. Clust. Comput., 1-14 (2012). doi: 10. 1007/s10586-012-0231-x.
    • (2012) Clust. Comput. , pp. 1-14
    • Flahive, A.1    Taniar, D.2    Rahayu, W.3
  • 6
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Lecture Notes in Computer Science, N. Kaisa and M. H. Howard (Eds.), Berlin: Springer
    • Florian, H.: Efficient identity based signature schemes based on pairings. In: Kaisa, N., Howard, M. H. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 2595, pp. 310-324. Springer, Berlin (2002).
    • (2002) Selected Areas in Cryptography , vol.2595 , pp. 310-324
    • Florian, H.1
  • 7
    • 54249111511 scopus 로고    scopus 로고
    • An efficient ID-based proxy signature scheme from pairings
    • D. Pei, M. Yung, D. Lin, and C. Wu (Eds.), Berlin: Springer
    • Gu, C., Zhu, Y.: An efficient ID-based proxy signature scheme from pairings. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt. Lecture Notes in Computer Science, vol. 4990, pp. 40-50. Springer, Berlin (2007).
    • (2007) Inscrypt. Lecture Notes in Computer Science , vol.4990 , pp. 40-50
    • Gu, C.1    Zhu, Y.2
  • 8
    • 0345092813 scopus 로고    scopus 로고
    • Legal recognition of digital-signatures
    • Hollaar, L., Asay, A.: Legal recognition of digital-signatures. J. IEEE MICRO 16(3), 44-45 (1996).
    • (1996) J. IEEE MICRO , vol.16 , Issue.3 , pp. 44-45
    • Hollaar, L.1    Asay, A.2
  • 9
    • 84888845937 scopus 로고    scopus 로고
    • Snuage: an efficient platform-as-a-service security framework for the cloud
    • doi: 10. 1007/s10586-012-0223-x
    • Itani, W., Kayssi, A., Chehab, A.: Snuage: an efficient platform-as-a-service security framework for the cloud. Clust. Comput., 1-18 (2012). doi: 10. 1007/s10586-012-0223-x.
    • (2012) Clust. Comput. , pp. 1-18
    • Itani, W.1    Kayssi, A.2    Chehab, A.3
  • 10
    • 0010567510 scopus 로고    scopus 로고
    • Proxy signatures, revisited
    • Y. Han, T. Okamoto, and S. Qing (Eds.), Berlin: Springer
    • Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS. Lecture Notes in Computer Science, vol. 1334, pp. 223-232. Springer, Berlin (1997).
    • (1997) ICICS. Lecture Notes in Computer Science , vol.1334 , pp. 223-232
    • Kim, S.1    Park, S.2    Won, D.3
  • 16
    • 77950358775 scopus 로고    scopus 로고
    • Cloud computing and SaaS as new computing platforms
    • Michael, A. C.: Cloud computing and SaaS as new computing platforms. Commun. ACM 53(4), 27-29 (2010).
    • (2010) Commun. ACM , vol.53 , Issue.4 , pp. 27-29
    • Michael, A.C.1
  • 17
    • 84881024032 scopus 로고    scopus 로고
    • Research trends in cloud, cluster and grid computing
    • doi: 10. 1007/s10586-012-0213-z
    • Park, J., Yang, L. T., Chen, J.: Research trends in cloud, cluster and grid computing. Clust. Comput., 1-3 (2012). doi: 10. 1007/s10586-012-0213-z.
    • (2012) Clust. Comput. , pp. 1-3
    • Park, J.1    Yang, L.T.2    Chen, J.3
  • 19
    • 84880883264 scopus 로고    scopus 로고
    • Improved online/offline signature schemes
    • Santa Barbara, California, USA19-23 August 2001Lecture Notes in Computer Science, Berlin: Springer
    • Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Advances in Cryptology-CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 19-23 August 2001. Lecture Notes in Computer Science, vol. 2139, pp. 355-367. Springer, Berlin (2001).
    • (2001) Advances in Cryptology-CRYPTO 2001, 21st Annual International Cryptology Conference , vol.2139 , pp. 355-367
    • Shamir, A.1    Tauman, Y.2
  • 20
    • 38049022497 scopus 로고    scopus 로고
    • Identity-based proxy signature from pairings
    • LNCS, Berlin: Springer
    • Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based proxy signature from pairings. In: Autonomic and Trusted Computing. LNCS, vol. 4610, pp. 22-31. Springer, Berlin (2007).
    • (2007) Autonomic and Trusted Computing , vol.4610 , pp. 22-31
    • Wu, W.1    Mu, Y.2    Susilo, W.3    Seberry, J.4    Huang, X.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.