-
1
-
-
77951616133
-
Legal issues in mobile banking
-
R.H. Weber, and A. Darbellay Legal issues in mobile banking J. Bank. Regul. 11 2 2010 129 145
-
(2010)
J. Bank. Regul.
, vol.11
, Issue.2
, pp. 129-145
-
-
Weber, R.H.1
Darbellay, A.2
-
2
-
-
84869765138
-
Privacy, security and trust in cloud computing: The perspective of the telecommunication industry
-
L.A. Martucci, A. Zuccato, B. Smeets, S.M. Habib, T. Johansson, N. Shahmehri, Privacy, security and trust in cloud computing: the perspective of the telecommunication industry, in: The 9th International Conference on Ubiquitous Intelligence Computing and the 9th International Conference on Autonomic Trusted Computing (UIC/ATC), 2012, pp. 627-632.
-
(2012)
The 9th International Conference on Ubiquitous Intelligence Computing and the 9th International Conference on Autonomic Trusted Computing (UIC/ATC)
, pp. 627-632
-
-
Martucci, L.A.1
Zuccato, A.2
Smeets, B.3
Habib, S.M.4
Johansson, T.5
Shahmehri, N.6
-
3
-
-
84897992320
-
To use or not to use mobile devices
-
B. Markelj, and I. Bernik To use or not to use mobile devices J. Internet Technol. Secured Trans. (JITST) 1 1/2 2012 < http://www.infonomics-society. org/JITST/ToUseorNottoUseMobileDevices.pdf >
-
(2012)
J. Internet Technol. Secured Trans. (JITST)
, vol.1
, Issue.1-2
-
-
Markelj, B.1
Bernik, I.2
-
4
-
-
84868549367
-
Security concerns in cloud computing
-
Las Vegas, Nevada, USA, April 15-17
-
I. Khalil, A. Khreishah, S. Bouktif, A. Ahmad, Security concerns in cloud computing, in: Proceedings of the 10th International Conference on Information Technology: New Generations, Las Vegas, Nevada, USA, April 15-17, 2013.
-
(2013)
Proceedings of the 10th International Conference on Information Technology: New Generations
-
-
Khalil, I.1
Khreishah, A.2
Bouktif, S.3
Ahmad, A.4
-
5
-
-
84897991309
-
-
(accessed 10.01.14)
-
http://www.digitalbuzzblog.com/infographic-2013-mobile-growth-statistics/ (accessed 10.01.14).
-
-
-
-
8
-
-
84897989515
-
-
(accessed 10.01.14)
-
http://www.abiresearch.com/research/product/1012083-mobile-device- security (accessed 10.01.14).
-
-
-
-
10
-
-
84891065445
-
Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth
-
M. Leandro, T. Nascimento, D. Santos, M. Westphall, C. Westphall, Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth, in: The Eleventh International Conference on Network (ICN), 2012, pp. 88-93.
-
(2012)
The Eleventh International Conference on Network (ICN)
, pp. 88-93
-
-
Leandro, M.1
Nascimento, T.2
Santos, D.3
Westphall, M.4
Westphall, C.5
-
11
-
-
84883284958
-
-
Ed. Microsoft. July 31 (accessed 10.01.14)
-
D. Hardt, The OAuth 2.0 Authorization Framework, Ed. Microsoft. July 31, 2012. < http://tools.ietf.org/html/draft-ietf-oauth-v2-31 > (accessed 10.01.14).
-
(2012)
The OAuth 2.0 Authorization Framework
-
-
Hardt, D.1
-
12
-
-
84897996657
-
-
(accessed 10.01.14)
-
http://openid.net/specs/openid-authentication-2-0.html (accessed 10.01.14).
-
-
-
-
13
-
-
84897982002
-
-
(accessed 10.01.14)
-
https://www.sans.org/reading-room/whitepapers/application/ attacks-oauth-secure-oauth-implementation-33644 (accessed 10.01.14).
-
-
-
-
14
-
-
84898014876
-
-
(accessed 10.01.14)
-
http://thenextweb.com/socialmedia/2010/07/17/oauth-and-openid- authentication-vulnerable-to-timing-attack/#!q0tFt (accessed 10.01.14).
-
-
-
-
15
-
-
84878355933
-
Signing me onto your accounts through Facebook and Google: A traffic-guided security study of commercially deployed single-sign-on web services
-
USA
-
R. Wang, S. Chen, X. Wang, Signing me onto your accounts through Facebook and Google: a traffic-guided security study of commercially deployed single-sign-on web services, in: The Proceedings of the IEEE Symposium on Security and Privacy, USA, 2012, pp. 365-379.
-
(2012)
The Proceedings of the IEEE Symposium on Security and Privacy
, pp. 365-379
-
-
Wang, R.1
Chen, S.2
Wang, X.3
-
16
-
-
84897979602
-
-
(accessed 10.01.14)
-
OpenID Still Open To Abuse. < http://www.computing.co.uk/ctg/opinion/ 1824215/openid-abuse > (accessed 10.01.14).
-
OpenID Still Open to Abuse
-
-
-
17
-
-
84897971747
-
-
(accessed 10.01.14)
-
http://lists.danga.com/pipermail/yadis/2005-June/000472.html (accessed 10.01.14).
-
-
-
-
19
-
-
78650535610
-
An entity-centric approach for privacy and identity management in cloud computing
-
P. Angin, B. Bhargava, R. Ranchal, N. Singh, M. Linderman, L.B. Othmane, L. Lilien, An entity-centric approach for privacy and identity management in cloud computing, in: The 29th IEEE Symposium on Reliable Distributed Systems, 2010, pp. 177-183.
-
(2010)
The 29th IEEE Symposium on Reliable Distributed Systems
, pp. 177-183
-
-
Angin, P.1
Bhargava, B.2
Ranchal, R.3
Singh, N.4
Linderman, M.5
Othmane, L.B.6
Lilien, L.7
-
20
-
-
84858823987
-
Trust-aware federated IdM in consumer cloud computing
-
R. Guerrero, P. Cabarcos, F. Mendoza, D. Diaz-Sanchez, Trust-aware federated IdM in consumer cloud computing, in: The Proceedings of the IEEE International Conference on Consumer Electronics (ICCE), 2012, pp. 53-54.
-
(2012)
The Proceedings of the IEEE International Conference on Consumer Electronics (ICCE)
, pp. 53-54
-
-
Guerrero, R.1
Cabarcos, P.2
Mendoza, F.3
Diaz-Sanchez, D.4
-
21
-
-
84863968528
-
Integral federated identity management for cloud computing
-
M. Stihler, A. Santin, A. Marcon, J. Fraga, Integral federated identity management for cloud computing, in: The 5th International Conference on New Technologies, Mobility and Security (NTMS), 2012, pp. 1-5.
-
(2012)
The 5th International Conference on New Technologies, Mobility and Security (NTMS)
, pp. 1-5
-
-
Stihler, M.1
Santin, A.2
Marcon, A.3
Fraga, J.4
-
22
-
-
84863421590
-
Building up trusted identity management in mobile heterogeneous environment
-
P. Zhang, H. Sun, Z. Yan, Building up trusted identity management in mobile heterogeneous environment, in: 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011, pp. 873-877.
-
(2011)
10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 873-877
-
-
Zhang, P.1
Sun, H.2
Yan, Z.3
-
23
-
-
84897985407
-
-
(accessed 10.01.14)
-
https://blogs.rsa.com/anatomy-of-an-attack/ (accessed 10.01.14).
-
-
-
-
24
-
-
84897997870
-
-
(accessed 10.01.14)
-
www.lastpass.com/adobe (accessed 10.01.14).
-
-
-
-
25
-
-
85063830027
-
Cloud computing security: A survey
-
10.3390/computers3010001
-
I. Khalil, A. Khreishah, and M. Azeem Cloud computing security: a survey Comput. (MDPI J.) 3 1 2014 1 35 10.3390/computers3010001
-
(2014)
Comput. (MDPI J.)
, vol.3
, Issue.1
, pp. 1-35
-
-
Khalil, I.1
Khreishah, A.2
Azeem, M.3
-
26
-
-
84898015387
-
-
(accessed 10.01.14)
-
http://www.gtcybersecuritysummit.com/2014Report.pdf (accessed 10.01.14).
-
-
-
-
27
-
-
84897998547
-
-
(accessed 10.01.14)
-
http://www.newscenter.gatech.edu/2013/11/06/georgia-tech-warns-threats- cloud-data-storage-mobile-devices-latest-%E2%80%98emerging-cyber (accessed 10.01.14).
-
-
-
-
28
-
-
84897995397
-
-
(accessed 10.01.14)
-
http://resources.infosecinstitute.com/android-master-key-vulnerability- poc/ (accessed 10.01.14).
-
-
-
-
29
-
-
84898001740
-
-
(accessed 10.01.14)
-
https://sites.google.com/site/openidreview/issues (accessed 10.01.14).
-
-
-
-
30
-
-
67650679649
-
Analysis of mobile WiMAX security: Vulnerabilities and solutions
-
Atlanta, Georgia
-
T. Han, N. Zhang, K. Liu, B. Tang, Y. Liu, Analysis of mobile WiMAX security: vulnerabilities and solutions, in: IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Atlanta, Georgia, 2008, pp. 828-833.
-
(2008)
IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
, pp. 828-833
-
-
Han, T.1
Zhang, N.2
Liu, K.3
Tang, B.4
Liu, Y.5
-
31
-
-
79957590723
-
ELMO: Energy aware local monitoring in sensor networks
-
I. Khalil ELMO: energy aware local monitoring in sensor networks IEEE Trans. Dependable Secure Comput. 8 4 2011 523 536
-
(2011)
IEEE Trans. Dependable Secure Comput.
, vol.8
, Issue.4
, pp. 523-536
-
-
Khalil, I.1
-
32
-
-
79551638042
-
MCC: Mitigating colluding collision attacks in wireless sensor networks
-
Miami, Florida, USA, December 6-10
-
I. Khalil, MCC: mitigating colluding collision attacks in wireless sensor networks, in: Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM'10), Miami, Florida, USA, December 6-10, 2010, pp. 1-5.
-
(2010)
Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM'10)
, pp. 1-5
-
-
Khalil, I.1
-
33
-
-
77951599568
-
MPC: Mitigating stealthy power control attacks in wireless ad hoc networks
-
Honolulu, Hawaii, USA, November 30-December 4
-
I. Khalil, MPC: mitigating stealthy power control attacks in wireless ad hoc networks, in: Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM'09), Honolulu, Hawaii, USA, November 30-December 4, 2009, pp. 1-6.
-
(2009)
Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM'09)
, pp. 1-6
-
-
Khalil, I.1
-
34
-
-
84864876206
-
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
-
I. Dacosta, S. Chakradeo, M. Ahamad, and P. Traynor One-time cookies: preventing session hijacking attacks with stateless authentication tokens ACM Trans. Internet Technol. 12 1 2012 1:1 1:24
-
(2012)
ACM Trans. Internet Technol.
, vol.12
, Issue.1
, pp. 11-124
-
-
Dacosta, I.1
Chakradeo, S.2
Ahamad, M.3
Traynor, P.4
-
35
-
-
84898005426
-
-
(accessed 10.01.14)
-
http://www.ieee-globecom.org/2012/private/T10F.pdf (accessed 10.01.14).
-
-
-
-
36
-
-
84897980505
-
-
(accessed 10.01.14)
-
http://www.oracle.com/technetwork/java/javase/overview/index.html (accessed 10.01.14).
-
-
-
-
37
-
-
84859045783
-
Enhancing privacy and dynamic federation in IdM for consumer cloud computing
-
R. Sanchez, F. Almenares, P. Arias, D. Diaz-Sanchez, and A. Marin Enhancing privacy and dynamic federation in IdM for consumer cloud computing IEEE Trans. Consum. Electron. 58 1 2012 95 103
-
(2012)
IEEE Trans. Consum. Electron.
, vol.58
, Issue.1
, pp. 95-103
-
-
Sanchez, R.1
Almenares, F.2
Arias, P.3
Diaz-Sanchez, D.4
Marin, A.5
-
38
-
-
84898005465
-
Designing high performance web-based computing services to promote telemedicine database management system
-
10.1109/TSC.2014.2300499
-
I. Hababeh, I. Khalil, and A. Khreishah Designing high performance web-based computing services to promote telemedicine database management system IEEE Trans. Serv. Comput. 2 2014 10.1109/TSC.2014.2300499
-
(2014)
IEEE Trans. Serv. Comput.
, Issue.2
-
-
Hababeh, I.1
Khalil, I.2
Khreishah, A.3
-
39
-
-
81455155109
-
Sustainable GPU computing at scale
-
J. Shi, M. Taifi, A. Khreishah, J. Wu, Sustainable GPU computing at scale, in: 14th IEEE International Conference in Computational Science and Engineering, 2011, pp. 263-272.
-
(2011)
14th IEEE International Conference in Computational Science and Engineering
, pp. 263-272
-
-
Shi, J.1
Taifi, M.2
Khreishah, A.3
Wu, J.4
|