-
1
-
-
84861307113
-
The NIST definition of cloud computing (draft)
-
Mell P., Grance T., The NIST definition of cloud computing (draft). NIST Special Publication 2011 800 145
-
(2011)
NIST Special Publication
, vol.800
, pp. 145
-
-
Mell, P.1
Grance, T.2
-
4
-
-
84857366721
-
Trust in the cloud
-
2-s2.0-84857366721 10.1016/j.istr.2011.08.006
-
Abbadi I. M., Martin A., Trust in the cloud. Information Security Technical Report 2011 16 3-4 108 114 2-s2.0-84857366721 10.1016/j.istr.2011.08. 006
-
(2011)
Information Security Technical Report
, vol.16
, Issue.3-4
, pp. 108-114
-
-
Abbadi, I.M.1
Martin, A.2
-
6
-
-
84871153200
-
-
2012
-
TCG, Trusted computing. 2012, http://www.trustedcomputinggroup.org/ trusted-computing
-
Trusted Computing
-
-
Tcg1
-
7
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
Yan L., Rong C., Zhao G., Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. Cloud Computing 2009 167 177
-
(2009)
Cloud Computing
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
-
8
-
-
84855678652
-
What makes users refuse web single sign-on?: An empirical investigation of OpenID
-
Sun S.-T., Pospisil E., Muslukhov I., Dindar N., Hawkey K., Beznosov K., What makes users refuse web single sign-on?: an empirical investigation of OpenID. Proceedings of the 7th Symposium on Usable Privacy and Security (SOUPS '11) July 2011 4 2-s2.0-84855678652 10.1145/2078827.2078833
-
Proceedings of the 7th Symposium on Usable Privacy and Security (SOUPS '11) July 2011 2-s2.0-84855678652 10.1145/2078827.2078833
, pp. 4
-
-
Sun, S.-T.1
Pospisil, E.2
Muslukhov, I.3
Dindar, N.4
Hawkey, K.5
Beznosov, K.6
-
11
-
-
70349233792
-
Formal analysis of SAML 2.0 web browser single sign-on: Breaking the SAML-based single sign-on for google apps
-
Armando A., Carbone R., Compagna L., Cuellar J., Tobarra L., Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE '08) October 2008 1 9 2-s2.0-70349233792 10.1145/1456396.1456397
-
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE '08) October 2008 2-s2.0-70349233792 10.1145/1456396.1456397
, pp. 1-9
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuellar, J.4
Tobarra, L.5
-
16
-
-
79960376768
-
Remote user authentication scheme with hardware-based attestation
-
2-s2.0-79960376768 10.1007/978-3-642-22191-0-38
-
Mat Nor F. B., Abd Jalil K., Ab Manan J.-L., Remote user authentication scheme with hardware-based attestation. Communications in Computer and Information Science 2011 180 2 437 447 2-s2.0-79960376768 10.1007/978-3-642- 22191-0-38
-
(2011)
Communications in Computer and Information Science
, vol.180
, Issue.2
, pp. 437-447
-
-
Mat Nor, F.B.1
Abd Jalil, K.2
Ab Manan, J.-L.3
-
17
-
-
78751558943
-
A billion keys, but few locks: The crisis of web single sign-on
-
Sun S.-T., Boshmaf Y., Hawkey K., Beznosov K., A billion keys, but few locks: the crisis of web single sign-on. Proceedings of the New Security Paradigms Workshop (NSPW '10) September 2010 61 71 2-s2.0-78751558943 10.1145/1900546.1900556
-
Proceedings of the New Security Paradigms Workshop (NSPW '10) September 2010 2-s2.0-78751558943 10.1145/1900546.1900556
, pp. 61-71
-
-
Sun, S.-T.1
Boshmaf, Y.2
Hawkey, K.3
Beznosov, K.4
-
24
-
-
84896325147
-
-
2010
-
Cooke P., Black Hat TPM Hack and BitLocker. 2010, http://blogs.windows. com/windows/b/windowssecurity/archive/2010/02/10/black-hat-tpm-hack-and- bitlocker.aspx
-
Black Hat TPM Hack and BitLocker
-
-
Cooke, P.1
|