메뉴 건너뛰기




Volumn 65, Issue , 2014, Pages 99-110

Consolidated Identity Management System for secure mobile cloud computing

Author keywords

Cloud computing security; Identity Management Systems; Mobile clients; Privacy; Security attacks

Indexed keywords

DATA PRIVACY; DISTRIBUTED DATABASE SYSTEMS; EXPERIMENTS; MOBILE CLOUD COMPUTING; MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS; NATURAL LANGUAGE PROCESSING SYSTEMS; SURVEYS;

EID: 84897983792     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2014.03.015     Document Type: Article
Times cited : (52)

References (40)
  • 1
    • 77951616133 scopus 로고    scopus 로고
    • Legal issues in mobile banking
    • R.H. Weber, and A. Darbellay Legal issues in mobile banking J. Bank. Regul. 11 2 2010 129 145
    • (2010) J. Bank. Regul. , vol.11 , Issue.2 , pp. 129-145
    • Weber, R.H.1    Darbellay, A.2
  • 3
    • 84897992320 scopus 로고    scopus 로고
    • To use or not to use mobile devices
    • B. Markelj, and I. Bernik To use or not to use mobile devices J. Internet Technol. Secured Trans. (JITST) 1 1/2 2012 < http://www.infonomics-society. org/JITST/ToUseorNottoUseMobileDevices.pdf >
    • (2012) J. Internet Technol. Secured Trans. (JITST) , vol.1 , Issue.1-2
    • Markelj, B.1    Bernik, I.2
  • 5
    • 84897991309 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • http://www.digitalbuzzblog.com/infographic-2013-mobile-growth-statistics/ (accessed 10.01.14).
  • 8
    • 84897989515 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • http://www.abiresearch.com/research/product/1012083-mobile-device- security (accessed 10.01.14).
  • 11
    • 84883284958 scopus 로고    scopus 로고
    • Ed. Microsoft. July 31 (accessed 10.01.14)
    • D. Hardt, The OAuth 2.0 Authorization Framework, Ed. Microsoft. July 31, 2012. < http://tools.ietf.org/html/draft-ietf-oauth-v2-31 > (accessed 10.01.14).
    • (2012) The OAuth 2.0 Authorization Framework
    • Hardt, D.1
  • 12
    • 84897996657 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • http://openid.net/specs/openid-authentication-2-0.html (accessed 10.01.14).
  • 13
    • 84897982002 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • https://www.sans.org/reading-room/whitepapers/application/ attacks-oauth-secure-oauth-implementation-33644 (accessed 10.01.14).
  • 14
    • 84898014876 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • http://thenextweb.com/socialmedia/2010/07/17/oauth-and-openid- authentication-vulnerable-to-timing-attack/#!q0tFt (accessed 10.01.14).
  • 15
    • 84878355933 scopus 로고    scopus 로고
    • Signing me onto your accounts through Facebook and Google: A traffic-guided security study of commercially deployed single-sign-on web services
    • USA
    • R. Wang, S. Chen, X. Wang, Signing me onto your accounts through Facebook and Google: a traffic-guided security study of commercially deployed single-sign-on web services, in: The Proceedings of the IEEE Symposium on Security and Privacy, USA, 2012, pp. 365-379.
    • (2012) The Proceedings of the IEEE Symposium on Security and Privacy , pp. 365-379
    • Wang, R.1    Chen, S.2    Wang, X.3
  • 16
    • 84897979602 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • OpenID Still Open To Abuse. < http://www.computing.co.uk/ctg/opinion/ 1824215/openid-abuse > (accessed 10.01.14).
    • OpenID Still Open to Abuse
  • 17
    • 84897971747 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • http://lists.danga.com/pipermail/yadis/2005-June/000472.html (accessed 10.01.14).
  • 23
    • 84897985407 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • https://blogs.rsa.com/anatomy-of-an-attack/ (accessed 10.01.14).
  • 24
    • 84897997870 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • www.lastpass.com/adobe (accessed 10.01.14).
  • 25
    • 85063830027 scopus 로고    scopus 로고
    • Cloud computing security: A survey
    • 10.3390/computers3010001
    • I. Khalil, A. Khreishah, and M. Azeem Cloud computing security: a survey Comput. (MDPI J.) 3 1 2014 1 35 10.3390/computers3010001
    • (2014) Comput. (MDPI J.) , vol.3 , Issue.1 , pp. 1-35
    • Khalil, I.1    Khreishah, A.2    Azeem, M.3
  • 26
    • 84898015387 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • http://www.gtcybersecuritysummit.com/2014Report.pdf (accessed 10.01.14).
  • 27
    • 84897998547 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • http://www.newscenter.gatech.edu/2013/11/06/georgia-tech-warns-threats- cloud-data-storage-mobile-devices-latest-%E2%80%98emerging-cyber (accessed 10.01.14).
  • 28
    • 84897995397 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • http://resources.infosecinstitute.com/android-master-key-vulnerability- poc/ (accessed 10.01.14).
  • 29
    • 84898001740 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • https://sites.google.com/site/openidreview/issues (accessed 10.01.14).
  • 31
    • 79957590723 scopus 로고    scopus 로고
    • ELMO: Energy aware local monitoring in sensor networks
    • I. Khalil ELMO: energy aware local monitoring in sensor networks IEEE Trans. Dependable Secure Comput. 8 4 2011 523 536
    • (2011) IEEE Trans. Dependable Secure Comput. , vol.8 , Issue.4 , pp. 523-536
    • Khalil, I.1
  • 32
    • 79551638042 scopus 로고    scopus 로고
    • MCC: Mitigating colluding collision attacks in wireless sensor networks
    • Miami, Florida, USA, December 6-10
    • I. Khalil, MCC: mitigating colluding collision attacks in wireless sensor networks, in: Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM'10), Miami, Florida, USA, December 6-10, 2010, pp. 1-5.
    • (2010) Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM'10) , pp. 1-5
    • Khalil, I.1
  • 33
    • 77951599568 scopus 로고    scopus 로고
    • MPC: Mitigating stealthy power control attacks in wireless ad hoc networks
    • Honolulu, Hawaii, USA, November 30-December 4
    • I. Khalil, MPC: mitigating stealthy power control attacks in wireless ad hoc networks, in: Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM'09), Honolulu, Hawaii, USA, November 30-December 4, 2009, pp. 1-6.
    • (2009) Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM'09) , pp. 1-6
    • Khalil, I.1
  • 34
    • 84864876206 scopus 로고    scopus 로고
    • One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
    • I. Dacosta, S. Chakradeo, M. Ahamad, and P. Traynor One-time cookies: preventing session hijacking attacks with stateless authentication tokens ACM Trans. Internet Technol. 12 1 2012 1:1 1:24
    • (2012) ACM Trans. Internet Technol. , vol.12 , Issue.1 , pp. 11-124
    • Dacosta, I.1    Chakradeo, S.2    Ahamad, M.3    Traynor, P.4
  • 35
    • 84898005426 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • http://www.ieee-globecom.org/2012/private/T10F.pdf (accessed 10.01.14).
  • 36
    • 84897980505 scopus 로고    scopus 로고
    • (accessed 10.01.14)
    • http://www.oracle.com/technetwork/java/javase/overview/index.html (accessed 10.01.14).
  • 38
    • 84898005465 scopus 로고    scopus 로고
    • Designing high performance web-based computing services to promote telemedicine database management system
    • 10.1109/TSC.2014.2300499
    • I. Hababeh, I. Khalil, and A. Khreishah Designing high performance web-based computing services to promote telemedicine database management system IEEE Trans. Serv. Comput. 2 2014 10.1109/TSC.2014.2300499
    • (2014) IEEE Trans. Serv. Comput. , Issue.2
    • Hababeh, I.1    Khalil, I.2    Khreishah, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.