-
1
-
-
84974529249
-
A secure mobile cloud identity: Criteria for effective identity and access management standards
-
IEEE
-
N. Naik and P. Jenkins, "A secure mobile cloud identity: Criteria for effective identity and access management standards," in 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud 2016). IEEE, 2016, pp. 89-90.
-
(2016)
2016 4th IEEE International Conference On Mobile Cloud Computing, Services, and Engineering (MobileCloud 2016)
, pp. 89-90
-
-
Naik, N.1
Jenkins, P.2
-
2
-
-
85006410561
-
Connecting Google cloud system with organizational systems for effortless data analysis by anyone, anytime, anywhere
-
IEEE
-
N. Naik, "Connecting Google cloud system with organizational systems for effortless data analysis by anyone, anytime, anywhere," in IEEE International Symposium on Systems Engineering (ISSE 2016). IEEE, 2016.
-
(2016)
IEEE International Symposium On Systems Engineering (ISSE 2016)
-
-
Naik, N.1
-
4
-
-
80053461711
-
Experience-based access management: A life-cycle framework for identity and access management systems
-
C. A. Gunter, D. Liebovitz, and B. Malin, "Experience-based access management: A life-cycle framework for identity and access management systems," IEEE Security & Privacy, vol. 9, no. 5, p. 48, 2011.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.5
, pp. 48
-
-
Gunter, C.A.1
Liebovitz, D.2
Malin, B.3
-
6
-
-
78650573573
-
Cloud computing identity management
-
A. Gopalakrishnan, "Cloud computing identity management," SETLabs briefings, vol. 7, no. 7, pp. 45-55, 2009.
-
(2009)
SETLabs Briefings
, vol.7
, Issue.7
, pp. 45-55
-
-
Gopalakrishnan, A.1
-
8
-
-
85016032428
-
Applying computational intelligence for enhancing the dependability of multi-cloud systems using docker swarm
-
-, "Applying computational intelligence for enhancing the dependability of multi-cloud systems using docker swarm," in IEEE Symposium Series on Computational Intelligence (SSCI), 2016.
-
(2016)
IEEE Symposium Series On Computational Intelligence (SSCI)
-
-
Naik, N.1
-
11
-
-
84974518345
-
-
Pingidentity.com. [Online]. Available white paper/exp final wp mobile-application-idm-arch-8-11-v4
-
Pingidentity.com. (2011) A standards-based mobile application idm architecture. [Online]. Available: Http://www.enterprisemanagement360.com/wp-content/files mf/white paper/exp final wp mobile-application-idm-arch-8-11-v4
-
(2011)
A Standards-based Mobile Application Idm Architecture
-
-
-
12
-
-
85020662596
-
-
[Online]. Available Smedinghoff Paper-Introduction to Identity Management
-
T. J. Smedinghoff. (2008) Introduction to online identity management. [Online]. Available: Https://www.uncitral.org/pdf/english/colloquia/EC/Smedinghoff Paper-Introduction to Identity Management
-
(2008)
Introduction to Online Identity Management
-
-
Smedinghoff, T.J.1
-
16
-
-
85024499862
-
-
Apigee [Online]. Available
-
G. Brail and S. Ramji, OAuth-The Big Picture. Apigee, 2014. [Online]. Available: Http://pages.apigee.com/rs/apigee/images/oauth-ebook-2012-02
-
(2014)
OAuth-The Big Picture
-
-
Brail, G.1
Ramji, S.2
-
22
-
-
85024478443
-
-
IBM.com. (2015, September 8) Invoking the authorization endpoint for openid connect. [Online]. Available
-
IBM.com. (2015, September 8) Invoking the authorization endpoint for openid connect. [Online]. Available: Http://www-01.ibm.com/support/knowledgecenter/SSEQTP 8.5.5/com.ibm.websphere.wlp.core.doc/ae/twlp oidc auth endpoint.html
-
-
-
-
23
-
-
85024501233
-
-
Openid.com [Online]. Available
-
Openid.com. (2014) What is OpenID Connect [Online]. Available: Http://openid.net/connect/
-
(2014)
What Is OpenID Connect
-
-
-
26
-
-
85024475919
-
-
Connect2id.com. [Online]. Available
-
Connect2id.com. (2015) OAuth 2.0 authorisation endpoint. [Online]. Available: Http://connect2id.com/products/server/docs/api/authorization
-
(2015)
OAuth 2.0 Authorisation Endpoint
-
-
-
27
-
-
38949134629
-
-
Oasis-open.org. March 25 [Online]. Available
-
Oasis-open.org. (2008, March 25) Security Assertion Markup Language (SAML) v2.0 technical Overview. [Online]. Available: Http://docs. oasis-open.org/security/saml/Post2.0/sstc-saml-tech-overview-2.0.html
-
(2008)
Security Assertion Markup Language (SAML) v2.0 Technical Overview
-
-
-
28
-
-
85017397364
-
Native web communication protocols and their effects on the performance of web services and systems
-
IEEE
-
N. Naik, P. Jenkins, P. Davies, and D. Newell, "Native web communication protocols and their effects on the performance of web services and systems," in Computer and Information Technology (CIT), 2016 IEEE International Conference on. IEEE, 2016, pp. 219-225.
-
(2016)
Computer and Information Technology (CIT), 2016 IEEE International Conference On
, pp. 219-225
-
-
Naik, N.1
Jenkins, P.2
Davies, P.3
Newell, D.4
-
30
-
-
84915774545
-
On breaking saml: Be whoever you want to be
-
J. Somorovsky, A. Mayer, J. Schwenk, M. Kampmann, and M. Jensen, "On breaking saml: Be whoever you want to be." in USENIX Security Symposium, 2012, pp. 397-412.
-
(2012)
USENIX Security Symposium
, pp. 397-412
-
-
Somorovsky, J.1
Mayer, A.2
Schwenk, J.3
Kampmann, M.4
Jensen, M.5
-
31
-
-
84964420093
-
-
SANS [Online]. Available
-
SANS. (2003) Global information assurance certification paper. [Online]. Available: Https://www.giac.org/paper/gsec/2876/saml-common-security-language-web-services/104846
-
(2003)
Global Information Assurance Certification Paper
-
-
-
33
-
-
85024492151
-
-
J. Hodges, O. C. McLaren, P. Mishra, R. Netegrity, T. Moses, E. E. Prodromou, and S. M. Erdos, "Security and privacy considerations for the oasis security assertion markup language (saml)," 2002.
-
(2002)
Security and Privacy Considerations for the Oasis Security Assertion Markup Language (Saml)
-
-
Hodges, J.1
McLaren, O.C.2
Mishra, P.3
Netegrity, R.4
Moses, T.5
Prodromou, E.E.6
Erdos, S.M.7
-
36
-
-
84995458933
-
A comprehensive formal security analysis of oauth 2.0
-
ACM
-
D. Fett, R. Küsters, and G. Schmitz, "A comprehensive formal security analysis of oauth 2.0," in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016, pp. 1204-1215.
-
(2016)
Proceedings of the 2016 ACM SIGSAC Conference On Computer and Communications Security
, pp. 1204-1215
-
-
Fett, D.1
Küsters, R.2
Schmitz, G.3
-
37
-
-
85024499061
-
-
January 11 [Online]. Available
-
R. Millman. (2016, January 11) Researchers find two flaws in OAuth 2.0. [Online]. Available: Https://www.scmagazine.com/researchers-find-two-flaws-in-oauth-20/article/530038/
-
(2016)
Researchers Find Two Flaws in OAuth 2.0
-
-
Millman, R.1
-
39
-
-
79960855364
-
From multiple credentials to browser-based single signon: Are we more secure
-
Springer
-
A. Armando, R. Carbone, L. Compagna, J. Cuellar, G. Pellegrino, and A. Sorniotti, "From multiple credentials to browser-based single signon: Are we more secure" in IFIP International Information Security Conference. Springer, 2011, pp. 68-79.
-
(2011)
IFIP International Information Security Conference.
, pp. 68-79
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuellar, J.4
Pellegrino, G.5
Sorniotti, A.6
|