-
1
-
-
78149297521
-
Mutual protection in a cloud computing environment
-
IEEE, Piscataway, New Jersey, United States
-
Albeshri A, Caelli W: Mutual protection in a cloud computing environment. In High Performance Computing and Communications (HPCC), 2010 12th IEEE International Conference on. IEEE, Piscataway, New Jersey, United States; 2010:641–646
-
(2010)
High Performance Computing and Communications (HPCC), 2010 12th IEEE International Conference on
, pp. 641-646
-
-
Albeshri, A.1
Caelli, W.2
-
3
-
-
77954503612
-
Enhancing user authentication in claim-based identity management
-
IEEE, Piscataway, New Jersey, United States
-
Alrodhan WA, Mitchell CJ: Enhancing user authentication in claim-based identity management. In Collaborative Technologies and Systems (CTS), 2010 International Symposium on. IEEE, Piscataway, New Jersey, United States; 2010:75–83
-
(2010)
Collaborative Technologies and Systems (CTS), 2010 International Symposium on
, pp. 75-83
-
-
Alrodhan, W.A.1
Mitchell, C.J.2
-
4
-
-
78650535610
-
An entity-centric approach for privacy and identity management in cloud computing
-
IEEE, Piscataway, New Jersey, United States
-
Angin P, Bhargava B, Ranchal R, Singh N, Linderman M, Othmane LB, Lilien L: An entity-centric approach for privacy and identity management in cloud computing. In Reliable Distributed Systems, 2010 29th IEEE Symposium on. IEEE, Piscataway, New Jersey, United States; 2010:177–183
-
(2010)
Reliable Distributed Systems, 2010 29th IEEE Symposium on
, pp. 177-183
-
-
Angin, P.1
Bhargava, B.2
Ranchal, R.3
Singh, N.4
Linderman, M.5
Othmane, L.B.6
Lilien, L.7
-
5
-
-
84867249207
-
A metric-based approach to assess risk for “on cloud” federated identity management
-
Arias-Cabarcos P, Almenárez-Mendoza F, Marín-López A, Díaz-Sánchez D, Sánchez-Guerrero R: A metric-based approach to assess risk for “on cloud” federated identity management. J Netw Syst Manag 2012, 20: 513–533. Springer, 2012 Springer, 2012 10.1007/s10922-012-9244-2
-
(2012)
J Netw Syst Manag
, vol.20
, pp. 513-533
-
-
Arias-Cabarcos, P.1
Almenárez-Mendoza, F.2
Marín-López, A.3
Díaz-Sánchez, D.4
Sánchez-Guerrero, R.5
-
6
-
-
80455140339
-
An identity-centric internet: identity in the cloud, identity as a service and other delights
-
IEEE, Piscataway, New Jersey, United States
-
Ates M, Ravet S, Ahmat AM, Fayolle J: An identity-centric internet: identity in the cloud, identity as a service and other delights. In 2012 Seventh International Conference on Availability, Reliability and Security. IEEE, Piscataway, New Jersey, United States; 2011:555–560
-
(2011)
2012 Seventh International Conference on Availability, Reliability and Security
, pp. 555-560
-
-
Ates, M.1
Ravet, S.2
Ahmat, A.M.3
Fayolle, J.4
-
7
-
-
80955151071
-
-
16 Sussex Street, London SW1V 4RW UK
-
Bertino, E, Takahashi K: IdentityManagement: Concepts, Technologies, and Systems: ARTECH HOUSE, 16 Sussex Street, London SW1V 4RW UK; 2010
-
(2010)
Identitymanagement: Concepts, Technologies, and Systems: ARTECH HOUSE
-
-
Bertino, E.1
Takahashi, K.2
-
9
-
-
34547522957
-
User centricity: a taxonomy and open issues
-
IOS Press, 2007
-
Bhargav-Spantzel A, Camenisch J, Gross T, Sommer D: User centricity: a taxonomy and open issues. J Comput Secur 2007, 15: 493–527. IOS Press, 2007
-
(2007)
J Comput Secur
, vol.15
, pp. 493-527
-
-
Bhargav-Spantzel, A.1
Camenisch, J.2
Gross, T.3
Sommer, D.4
-
10
-
-
85051743005
-
-
Online accessed September
-
Brute Force Attack. OWASP Testing Guide2013. [Online accessed September-2013]., [https://www.owasp.org/index.php/Brute_force_attack]
-
(2013)
OWASP Testing Guide2013
-
-
-
14
-
-
77955905901
-
Security and cloud computing: intercloud identity management infrastructure
-
IEEE, Piscataway, New Jersey, United States
-
Celesti A, Tusa F, Villari M, Puliafito A: Security and cloud computing: intercloud identity management infrastructure. In Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2010 19th IEEE International Workshop on. IEEE, Piscataway, New Jersey, United States; 2010:263–265
-
(2010)
Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2010 19th IEEE International Workshop on
, pp. 263-265
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
15
-
-
84857171004
-
Security APIs for my private cloud-granting access to anyone, from anywhere at any time
-
IEEE, Piscataway, New Jersey, United States
-
Chadwick DW, Casenove M: Security APIs for my private cloud-granting access to anyone, from anywhere at any time. In Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on. IEEE, Piscataway, New Jersey, United States; 2011:792–798
-
(2011)
Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on
, pp. 792-798
-
-
Chadwick, D.W.1
Casenove, M.2
-
16
-
-
0344197994
-
Some forgery attacks on a remote user authentication scheme using smart cards
-
Chang C-C: Some forgery attacks on a remote user authentication scheme using smart cards. Informatica 2003, 14: 289–294. IOS Press, 2003 IOS Press, 2003
-
(2003)
Informatica
, vol.14
, pp. 289-294
-
-
Chang, C.-C.1
-
17
-
-
84861072527
-
Data security and privacy protection issues in cloud computing
-
IEEE, Piscataway, New Jersey, United States
-
Chen D, Zhao H: Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on. IEEE, Piscataway, New Jersey, United States; 2012:647–651
-
(2012)
Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on
, pp. 647-651
-
-
Chen, D.1
Zhao, H.2
-
18
-
-
84874600573
-
A decentralized approach for implementing identity management in cloud computing
-
IEEE, Piscataway, New Jersey, United States
-
Chen J, Wu X, Zhang S, Zhang W, Niu Y: A decentralized approach for implementing identity management in cloud computing. In Cloud and Green Computing (CGC), 2012 Second International Conference on. IEEE, Piscataway, New Jersey, United States; 2012:770–776
-
(2012)
Cloud and Green Computing (CGC), 2012 Second International Conference on
, pp. 770-776
-
-
Chen, J.1
Wu, X.2
Zhang, S.3
Zhang, W.4
Niu, Y.5
-
19
-
-
42749100198
-
Distributed identity for secure service interaction
-
IEEE, Piscataway, New Jersey, United States
-
Chowdhury MM, Noll J: Distributed identity for secure service interaction. In Wireless and Mobile Communications, 2007. ICWMC’07. Third International Conference on. IEEE, Piscataway, New Jersey, United States; 2007:56–56
-
(2007)
Wireless and Mobile Communications, 2007. ICWMC’07. Third International Conference on
, pp. 56
-
-
Chowdhury, M.M.1
Noll, J.2
-
20
-
-
84856543069
-
A strong user authentication framework for cloud computing
-
IEEE, Piscataway, New Jersey, United States
-
Choudhury AJ, Kumar P, Sain M, Lim H, Jae-Lee H: A strong user authentication framework for cloud computing. In Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific. IEEE, Piscataway, New Jersey, United States; 2011:110–115
-
(2011)
Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific
, pp. 110-115
-
-
Choudhury, A.J.1
Kumar, P.2
Sain, M.3
Lim, H.4
Jae-Lee, H.5
-
22
-
-
78650035684
-
Privacy in an identity-based DRM system
-
IEEE, Piscataway, New Jersey, United States
-
Conrado C, Kamperman F, Schrijen GJ, Jonker W: Privacy in an identity-based DRM system. In the Proceedings of Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on. IEEE, Piscataway, New Jersey, United States; 2003:389–395
-
(2003)
the Proceedings of Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on
, pp. 389-395
-
-
Conrado, C.1
Kamperman, F.2
Schrijen, G.J.3
Jonker, W.4
-
23
-
-
41949139623
-
The seven flaws of identity management: usability and security challenges
-
Dhamija R, Dusseault L: The seven flaws of identity management: usability and security challenges. IEEE Secur Privacy 2008, 6: 24–29. IEEE, 2008 IEEE, 2008 10.1109/MSP.2008.49
-
(2008)
IEEE Secur Privacy
, vol.6
, pp. 24-29
-
-
Dhamija, R.1
Dusseault, L.2
-
24
-
-
84886902973
-
Security assessment of virtual machines in open source clouds
-
IEEE, Piscataway, New Jersey, United States
-
Donevski A, Ristov S, Gusev M: Security assessment of virtual machines in open source clouds. In Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on. IEEE, Piscataway, New Jersey, United States; 2013:1094–1099
-
(2013)
Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on
, pp. 1094-1099
-
-
Donevski, A.1
Ristov, S.2
Gusev, M.3
-
25
-
-
85051694004
-
-
[Online accessed August-2014]
-
Eucalyptus Systems, Inc.: Eucalyptus Identity and Access Management (IAM)2012., [Online accessed August-2014]., [https://www.eucalyptus.com/docs/eucalyptus/4.0/security-guide/security_bp_access.html]
-
(2012)
Eucalyptus Identity and Access Management (IAM)
-
-
-
26
-
-
78649885971
-
Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms
-
IEEE, Piscataway, New Jersey, United States
-
Feng J, Chen Y, Ku WS, Liu P: Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms. In Parallel Processing Workshops (ICPPW), 2010 39th International Conference on. IEEE, Piscataway, New Jersey, United States; 2010:251–258
-
(2010)
Parallel Processing Workshops (ICPPW), 2010 39th International Conference on
, pp. 251-258
-
-
Feng, J.1
Chen, Y.2
Ku, W.S.3
Liu, P.4
-
27
-
-
84866978488
-
A comparative analysis of identity management systems
-
IEEE, Piscataway, New Jersey, United States
-
Ferdous MS, Poet R: A comparative analysis of identity management systems. In High Performance Computing and Simulation (HPCS) 2012 International Conference on. IEEE, Piscataway, New Jersey, United States; 2012:454–461
-
(2012)
High Performance Computing and Simulation (HPCS) 2012 International Conference on
, pp. 454-461
-
-
Ferdous, M.S.1
Poet, R.2
-
28
-
-
68249129760
-
-
Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley
-
Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I: Above the Clouds: a Berkeley View of Cloud Computing. Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley; 2009
-
(2009)
Above the Clouds: a Berkeley View of Cloud Computing
-
-
Fox, A.1
Griffith, R.2
Joseph, A.3
Katz, R.4
Konwinski, A.5
Lee, G.6
Patterson, D.7
Rabkin, A.8
Stoica, I.9
-
29
-
-
78650573573
-
Cloud computing identity management
-
Gopalakrishnan A: Cloud computing identity management. SETLabs Briefings 2009, 7: 45–54
-
(2009)
SETLabs Briefings
, vol.7
, pp. 45-54
-
-
Gopalakrishnan, A.1
-
30
-
-
84891937506
-
Identity management in cloud computing-a review
-
ESRSA Publications, Kudasan, Gandhinagar, Gujarat, India
-
Gunjan K, Sahoo G, Tiwari RK: Identity management in cloud computing-a review. In International Journal of Engineering Research and Technology (Vol. 1, No. 4 (June-2012)). ESRSA Publications, Kudasan, Gandhinagar, Gujarat, India; 2012
-
(2012)
International Journal of Engineering Research and Technology (Vol. 1, No. 4 (June-2012))
-
-
Gunjan, K.1
Sahoo, G.2
Tiwari, R.K.3
-
32
-
-
79951614522
-
User-controlled automated identity delegation
-
IEEE, Piscataway, New Jersey, United States
-
Hoellrigl T, Kühner H, Dinger J, Hartenstein H: User-controlled automated identity delegation. In Network and Service Management (CNSM), 2010 International Conference on. IEEE, Piscataway, New Jersey, United States; 2010:230–233
-
(2010)
Network and Service Management (CNSM), 2010 International Conference on
, pp. 230-233
-
-
Hoellrigl, T.1
Kühner, H.2
Dinger, J.3
Hartenstein, H.4
-
33
-
-
79952952264
-
Cloud hooks: Security and privacy issues in cloud computing
-
IEEE, Piscataway, New Jersey, United States
-
Jansen WA: Cloud hooks: Security and privacy issues in cloud computing. In System Sciences (HICSS), 2011 44th Hawaii International Conference on. IEEE, Piscataway, New Jersey, United States; 2011:1–10
-
(2011)
System Sciences (HICSS), 2011 44th Hawaii International Conference on
, pp. 1-10
-
-
Jansen, W.A.1
-
34
-
-
79959433819
-
-
NIST special publication, 800, 144, NIST
-
Jansen, W, Grance T: Guidelines on Security and Privacy in Public Cloud Computing: NIST special publication, 800, 144, NIST; 2011
-
(2011)
Guidelines on Security and Privacy in Public Cloud Computing
-
-
Jansen, W.1
Grance, T.2
-
35
-
-
74349113474
-
On technical security issues in cloud computing
-
IEEE, Piscataway, New Jersey, United States
-
Jensen M, Schwenk J, Gruschka N, Iacono LL: On technical security issues in cloud computing. In Cloud Computing, 2009. CLOUD’09. IEEE International Conference on. IEEE, Piscataway, New Jersey, United States; 2009:109–116
-
(2009)
Cloud Computing, 2009. CLOUD’09. IEEE International Conference on
, pp. 109-116
-
-
Jensen, M.1
Schwenk, J.2
Gruschka, N.3
Iacono, L.L.4
-
36
-
-
54849408511
-
Trust requirements in identitymanagement
-
Australian Computer Society, Inc
-
Jøsang, A, Fabre J, Hay B, Dalziel J, Pope S: Trust requirements in identity management. In Proceedings of the 2005 Australasian workshop on Grid computing and e-research-Volume 44: Australian Computer Society, Inc.; 2005:99–108
-
(2005)
Proceedings of the 2005 Australasian workshop on Grid computing and e-research-Volume 44
, pp. 99-108
-
-
Jøsang, A.1
Fabre, J.2
Hay, B.3
Dalziel, J.4
Pope, S.5
-
37
-
-
78649268213
-
Chord based identity management for e-Healthcare cloud applications
-
IEEE, Piscataway, New Jersey, United States
-
Kim IK, Pervez Z, Khattak AM, Lee S: Chord based identity management for e-Healthcare cloud applications. In Applications and the Internet (SAINT), 2010 10th IEEE/IPSJ International Symposium on. IEEE, Piscataway, New Jersey, United States; 2010:391–394
-
(2010)
Applications and the Internet (SAINT), 2010 10th IEEE/IPSJ International Symposium on
, pp. 391-394
-
-
Kim, I.K.1
Pervez, Z.2
Khattak, A.M.3
Lee, S.4
-
38
-
-
84955314112
-
-
Kumar, R, Gupta N, Charu S, Jain K, Jangir SK: Open Source Solution for Cloud Computing Platform Using OpenStack; 2014
-
(2014)
Open Source Solution for Cloud Computing Platform Using OpenStack
-
-
Kumar, R.1
Gupta, N.2
Charu, S.3
Jain, K.4
Jangir, S.K.5
-
39
-
-
84860812520
-
-
Kumaraswamy, S, Lakshminarayanan S, Reiter M, Stein J, Wilson Y: Domain 12: Guidance for Identity & Access Management V2. 1. Cloud Security Alliance2010., [https://cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf]
-
(2010)
Domain 12: Guidance for Identity & Access Management V2. 1. Cloud Security Alliance
-
-
Kumaraswamy, S.1
Lakshminarayanan, S.2
Reiter, M.3
Stein, J.4
Wilson, Y.5
-
41
-
-
84891065445
-
Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth
-
Leandro, MA, Nascimento TJ, dos Santos DR, Westphall CM, Westphall CB: Multi-tenancy authorization system with federated identity for cloud-based environments using shibboleth. In ICN 2012, The Eleventh International Conference on Networks; 2012:88–93
-
(2012)
ICN 2012, The Eleventh International Conference on Networks
, pp. 88-93
-
-
Leandro, M.A.1
Nascimento, T.J.2
-
42
-
-
84868092711
-
Evaluation criteria for future identity management
-
IEEE, Piscataway, New Jersey, United States
-
Leskinen J: Evaluation criteria for future identity management. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, Piscataway, New Jersey, United States; 2012:801–806
-
(2012)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
, pp. 801-806
-
-
Leskinen, J.1
-
43
-
-
84872006849
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
-
Springer, Berlin, Heidelberg
-
Li M, Yu S, Ren K, Lou W: Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In Security and Privacy in Communication Networks. Springer, Berlin, Heidelberg; 2010:89–106
-
(2010)
Security and Privacy in Communication Networks
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
44
-
-
67650462486
-
An identity-based one-time password scheme with anonymous authentication
-
IEEE, Piscataway, New Jersey, United States
-
Luo S, Hu J, Chen Z: An identity-based one-time password scheme with anonymous authentication. In Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC’09. International Conference on. IEEE, Piscataway, New Jersey, United States; 2009:864–867
-
(2009)
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC’09. International Conference on
, pp. 864-867
-
-
Luo, S.1
Hu, J.2
Chen, Z.3
-
45
-
-
83055196683
-
Data location and security issues in cloud computing
-
IEEE, Piscataway, New Jersey, United States
-
Mahmood Z: “Data location and security issues in cloud computing”. In Emerging Intelligent Data and Web Technologies (EIDWT), 2011 International Conference on. IEEE, Piscataway, New Jersey, United States; 2011:49–54
-
(2011)
Emerging Intelligent Data and Web Technologies (EIDWT), 2011 International Conference on
, pp. 49-54
-
-
Mahmood, Z.1
-
46
-
-
77949842100
-
-
O’Reilly Media, Inc., Sebastopol, CA, USA
-
Mather T, Kumaraswamy S, Latif S: Cloud security and privacy: an enterprise perspective on risks and compliance. O’Reilly Media, Inc., Sebastopol, CA, USA; 2009
-
(2009)
Cloud security and privacy: an enterprise perspective on risks and compliance
-
-
Mather, T.1
Kumaraswamy, S.2
Latif, S.3
-
49
-
-
84960101069
-
-
Microsoft Developer Network
-
Meier, JD, Farre C, Taylor J, Bansode P, Gregersen S, Sundararajan M, Boucher R: Improving Web Services Security: Scenarios and Implementation Guidance for WCF: Microsoft Developer Network; 2009
-
(2009)
Improving Web Services Security: Scenarios and Implementation Guidance forWCF
-
-
Meier, J.D.1
Farre, C.2
Taylor, J.3
Bansode, P.4
Gregersen, S.5
Sundararajan, M.6
Boucher, R.7
-
50
-
-
84857615138
-
Towards privacy preserving access control in the cloud
-
IEEE, Piscataway, New Jersey, United States
-
Nabeel M, Bertino E, Kantarcioglu M, Thuraisingham B: Towards privacy preserving access control in the cloud. In Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on. IEEE, Piscataway, New Jersey, United States; 2011:172–180
-
(2011)
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on
, pp. 172-180
-
-
Nabeel, M.1
Bertino, E.2
Kantarcioglu, M.3
Thuraisingham, B.4
-
51
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
IEEE, Piscataway, New Jersey, United States
-
O’Gorman L: Comparing passwords, tokens, and biometrics for user authentication. In Proceedings of the IEEE. IEEE, Piscataway, New Jersey, United States; 2003:2021–2040
-
(2003)
Proceedings of the IEEE
, pp. 2021-2040
-
-
O’Gorman, L.1
-
52
-
-
79952925128
-
Architecting a cloud-scale identity fabric
-
Olden E: Architecting a cloud-scale identity fabric. Computer 2011, 44: 52–59. IEEE, 2011 IEEE, 2011 10.1109/MC.2011.60
-
(2011)
Computer
, vol.44
, pp. 52-59
-
-
Olden, E.1
-
54
-
-
79952367895
-
Privacy, security and trust issues arising from cloud computing
-
IEEE, Piscataway, New Jersey, United States
-
Pearson S, Benameur A: Privacy, security and trust issues arising from cloud computing. In Cloud Computing Technology and Science (CloudCom) 2010 IEEE Second International Conference on. IEEE, Piscataway, New Jersey, United States; 2010:693–702
-
(2010)
Cloud Computing Technology and Science (CloudCom) 2010 IEEE Second International Conference on
, pp. 693-702
-
-
Pearson, S.1
Benameur, A.2
-
55
-
-
78650536265
-
Protection of identity information in cloud computing without trusted third party
-
IEEE, Piscataway, New Jersey, United States
-
Ranchal R, Bhargava B, Othmane LB, Lilien L, Kim A, Kang M, Linderman M: Protection of identity information in cloud computing without trusted third party. In Reliable Distributed Systems, 2010 29th IEEE Symposium on. IEEE, Piscataway, New Jersey, United States; 2010:368–372
-
(2010)
Reliable Distributed Systems, 2010 29th IEEE Symposium on
, pp. 368-372
-
-
Ranchal, R.1
Bhargava, B.2
Othmane, L.B.3
Lilien, L.4
Kim, A.5
Kang, M.6
Linderman, M.7
-
56
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha NK, Connell JH, Bolle RM: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 2001, 40: 614–634. IBM, 2001 IBM, 2001 10.1147/sj.403.0614
-
(2001)
IBM Syst J
, vol.40
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
58
-
-
73549113094
-
A taxonomy and survey of cloud computing systems
-
IEEE, Piscataway, New Jersey, United States
-
Rimal BP, Choi E, Lumb I: A taxonomy and survey of cloud computing systems. In INC, IMS and IDC, 2009. NCM’09. Fifth International Joint Conference on. IEEE, Piscataway, New Jersey, United States; 2009:44–51
-
(2009)
INC, IMS and IDC, 2009. NCM’09. Fifth International Joint Conference on
, pp. 44-51
-
-
Rimal, B.P.1
Choi, E.2
Lumb, I.3
-
60
-
-
84859045783
-
Enhancing privacy and dynamic federation in IdM for consumer cloud computing
-
Sanchez R, Almenares F, Arias P, Diaz-Sanchez D, Marín A: Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Trans Consum Electron 2012, 58: 95–103. IEEE, 2012 IEEE, 2012 10.1109/TCE.2012.6170060
-
(2012)
IEEE Trans Consum Electron
, vol.58
, pp. 95-103
-
-
Sanchez, R.1
Almenares, F.2
Arias, P.3
Diaz-Sanchez, D.4
Marín, A.5
-
61
-
-
0036870280
-
SIP security issues: the SIP authentication procedure and its processing load
-
Salsano S, Veltri L, Papalilo D: SIP security issues: the SIP authentication procedure and its processing load. Network 2002, 16: 38–44. IEEE, 2002 IEEE, 2002
-
(2002)
Network
, vol.16
, pp. 38-44
-
-
Salsano, S.1
Veltri, L.2
Papalilo, D.3
-
62
-
-
77957948993
-
Quirc: A quantitative impact and risk assessment framework for cloud security
-
IEEE, Piscataway, New Jersey, United States
-
Saripalli P, Walters B: Quirc: A quantitative impact and risk assessment framework for cloud security. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on. IEEE, Piscataway, New Jersey, United States; 2010:280–288
-
(2010)
Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on
, pp. 280-288
-
-
Saripalli, P.1
Walters, B.2
-
64
-
-
80455173609
-
Biometric Authentication as a service for enterprise identity management deployment: a data protection perspective
-
IEEE, Piscataway, New Jersey, United States
-
Senk C, Dotzler F: Biometric Authentication as a service for enterprise identity management deployment: a data protection perspective. In Availability, Reliability and Security (ARES), 2011 Sixth International Conference on. IEEE, Piscataway, New Jersey, United States; 2011:43–50
-
(2011)
Availability, Reliability and Security (ARES), 2011 Sixth International Conference on
, pp. 43-50
-
-
Senk, C.1
Dotzler, F.2
-
65
-
-
77951101272
-
Authenticated dictionary-based attribute sharing in federated identity management
-
IEEE, Piscataway, New Jersey, United States
-
Shin D, Lopes R, Claycomb W: Authenticated dictionary-based attribute sharing in federated identity management. In Information Technology: New Generations, 2009. ITNG’09. Sixth International Conference on. IEEE, Piscataway, New Jersey, United States; 2009:504–509
-
(2009)
Information Technology: New Generations, 2009. ITNG’09. Sixth International Conference on
, pp. 504-509
-
-
Shin, D.1
Lopes, R.2
Claycomb, W.3
-
67
-
-
1642390522
-
User provisioning with SPML
-
Sodhi G: User provisioning with SPML. Inf Secur Tech Rep 2004, 9(1):86–96. 10.1016/S1363-4127(04)00018-4
-
(2004)
Inf Secur Tech Rep
, vol.9
, Issue.1
, pp. 86-96
-
-
Sodhi, G.1
-
68
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini S, Kavitha V: A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 2011, 34: 1–11. Elsevier Elsevier 10.1016/j.jnca.2010.07.006
-
(2011)
J Netw Comput Appl
, vol.34
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
69
-
-
59249091249
-
A user-centric federated single sign-on system
-
Suriadi S, Foo E, Jøsang A: A user-centric federated single sign-on system. J Netw Comput Appl 2009, 32: 388–401. Elsevier, 2009 Elsevier, 2009 10.1016/j.jnca.2008.02.016
-
(2009)
J Netw Comput Appl
, vol.32
, pp. 388-401
-
-
Suriadi, S.1
Foo, E.2
Jøsang, A.3
-
72
-
-
80155136769
-
Security issues and countermeasures in cloud computing
-
IEEE, Piscataway, New Jersey, United States
-
Wang JJ, Mu S: “Security issues and countermeasures in cloud computing”. In Grey Systems and Intelligent Services (GSIS), 2011 IEEE International Conference on. IEEE, Piscataway, New Jersey, United States; 2011:843–846
-
(2011)
Grey Systems and Intelligent Services (GSIS), 2011 IEEE International Conference on
, pp. 843-846
-
-
Wang, J.J.1
Mu, S.2
-
73
-
-
78650288030
-
New identity-based proxy re-encryption schemes to prevent collusion attacks
-
Springer, Berlin, Heidelberg
-
Wang L, Wang L, Mambo M, Okamoto E: New identity-based proxy re-encryption schemes to prevent collusion attacks. In Pairing-Based Cryptography-Pairing 2010. Springer, Berlin, Heidelberg; 2010:327–346
-
(2010)
Pairing-Based Cryptography-Pairing 2010
, pp. 327-346
-
-
Wang, L.1
Wang, L.2
Mambo, M.3
Okamoto, E.4
-
74
-
-
33750059230
-
-
O’Reilly Media, Inc., Sebastopol, CA, USA
-
Windley PJ: Digital Identity. O’Reilly Media, Inc., Sebastopol, CA, USA; 2005
-
(2005)
Digital Identity
-
-
Windley, P.J.1
-
75
-
-
71749086537
-
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
-
Springer, Berlin, Heidelberg
-
Yan L, Rong C, Zhao G: Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In Cloud Computing. Springer, Berlin, Heidelberg; 2009:167–177
-
(2009)
Cloud Computing
, pp. 167-177
-
-
Yan, L.1
Rong, C.2
Zhao, G.3
-
76
-
-
84864767404
-
Efficient password-based two factors authentication in cloud computing
-
Yassin AA, Jin H, Ibrahim A, Qiang W, Zou D: Efficient password-based two factors authentication in cloud computing. Int J Secur Appl 2012, 6: 143–148
-
(2012)
Int J Secur Appl
, vol.6
, pp. 143-148
-
-
Yassin, A.A.1
Jin, H.2
Ibrahim, A.3
Qiang, W.4
Zou, D.5
-
77
-
-
84866348681
-
Security issues and solutions in cloud computing
-
IEEE, Piscataway, New Jersey, United States
-
You P, Peng Y, Liu W, Xue S: Security issues and solutions in cloud computing. In Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. IEEE, Piscataway, New Jersey, United States; 2012:573–577
-
(2012)
Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on
, pp. 573-577
-
-
You, P.1
Peng, Y.2
Liu, W.3
Xue, S.4
-
78
-
-
62949146437
-
Toward a unified ontology of cloud computing
-
IEEE, Piscataway, New Jersey, United States
-
Youseff L, Butrico M, Da Silva D: Toward a unified ontology of cloud computing. In Grid Computing Environments Workshop, 2008. GCE’08. IEEE, Piscataway, New Jersey, United States; 2008:1–10
-
(2008)
Grid Computing Environments Workshop, 2008. GCE’08
, pp. 1-10
-
-
Youseff, L.1
Butrico, M.2
Da Silva, D.3
-
79
-
-
77957890452
-
Universal identity management model based on anonymous credentials
-
IEEE, Piscataway, New Jersey, United States
-
Zhang Y, Chen JL: Universal identity management model based on anonymous credentials. In Services Computing (SCC), 2010 IEEE International Conference on. IEEE, Piscataway, New Jersey, United States; 2010:305–312
-
(2010)
Services Computing (SCC), 2010 IEEE International Conference on
, pp. 305-312
-
-
Zhang, Y.1
Chen, J.L.2
-
80
-
-
79959557055
-
Addressing cloud computing security issues
-
Zissis D, Lekkas D: Addressing cloud computing security issues. Future Generat Comput Syst 2012, 28: 583–592. Elsevier, 2012 Elsevier, 2012 10.1016/j.future.2010.12.006
-
(2012)
Future Generat Comput Syst
, vol.28
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
81
-
-
56549095250
-
Side-channel attacks: ten years after its publication and the impacts on cryptographicmodule security testing
-
Zhou, Y, Feng D: Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing. In IACR Cryptology ePrint Archive, Volume 2005; 2005:388
-
(2005)
IACR Cryptology ePrint Archive, Volume 2005
, pp. 388
-
-
Zhou, Y.1
Feng, D.2
|