-
1
-
-
84974529249
-
A secure mobile cloud identity: Criteria for effective identity and access management standards
-
IEEE
-
N. Naik, and P. Jenkins, "A secure mobile cloud identity: Criteria for effective identity and access management standards, " in 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud 2016). IEEE, 2016.
-
(2016)
2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud 2016
-
-
Naik, N.1
Jenkins, P.2
-
3
-
-
85006410561
-
Connecting Google cloud system with organizational systems for effortless data analysis by anyone, anytime, anywhere
-
IEEE
-
N. Naik, "Connecting Google cloud system with organizational systems for effortless data analysis by anyone, anytime, anywhere, " in IEEE International Symposium on Systems Engineering (ISSE ). IEEE, 2016.
-
(2016)
IEEE International Symposium on Systems Engineering (ISSE
-
-
Naik, N.1
-
4
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh, and M. Franklin, "Identity-based encryption from the weil pairing, " SIAM Journal on Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84974518345
-
-
Pingidentity.com. Online]. Available
-
Pingidentity.com. (2011) A standards-based mobile application idm architecture. [Online]. Available: http://www:enterprisemanagement360:com/wp-content/files mf/white paper/exp final wp mobile-Application-idm-Arch-8-11-v4:pdf
-
(2011)
A Standards-based Mobile Application Idm Architecture
-
-
-
9
-
-
84951990979
-
-
B. Sc. Dissertation, Department of Computer Science and and Engineering Goteborg, Sweden
-
N. Ranjbar, and M. Abdinejadi, "Authentication and Authorization for Mobile Devices, " B. Sc. Dissertation, Department of Computer Science and and Engineering Goteborg, Sweden, 2012.
-
(2012)
Authentication and Authorization for Mobile Devices
-
-
Ranjbar, N.1
Abdinejadi, M.2
-
11
-
-
84995379469
-
-
JWT.io. Online]. Available
-
JWT.io. (2015) Introduction to JSON web tokens. [Online]. Available: https://jwt:io/introduction/
-
(2015)
Introduction to JSON Web Tokens
-
-
-
14
-
-
84995454567
-
Data confidentiality and integrity in mobile cloud computing
-
N. Alsulami, and M. M. Monowar, "Data confidentiality and integrity in mobile cloud computing, " Journal of Emerging Trends in Computing and Information Sciences, vol. 6, no. 3, pp. 138-143, 2015.
-
(2015)
Journal of Emerging Trends in Computing and Information Sciences
, vol.6
, Issue.3
, pp. 138-143
-
-
Alsulami, N.1
Monowar, M.M.2
-
15
-
-
84995454564
-
-
W3.org. Online]. Available
-
W3.org. (2015) XML security ? issues and requirements. [Online]. Available: http://www:w3:org/2007/xmlsec/ws/papers/09-lockhart-bea/
-
(2015)
XML Security ? Issues and Requirements
-
-
-
17
-
-
38949134629
-
-
Oasis-open.org March 25 [Online]. Available
-
Oasis-open.org. (2008, March 25) Security Assertion Markup Language (SAML) v2.0 technical Overview. [Online]. Available: http://docs:oasisopen :org/security/saml/Post2:0/sstc-saml-Tech-overview-2:0:html
-
(2008)
Security Assertion Markup Language (SAML) v2.0 Technical Overview
-
-
-
18
-
-
85017397364
-
Native web communication protocols and their effects on the performance of web services and systems
-
IEEE International Conference on. IEEE
-
N. Naik, P. Jenkins, P. Davies, and D. Newell, "Native web communication protocols and their effects on the performance of web services and systems, " in Computer and Information Technology (CIT), 2016 IEEE International Conference on. IEEE, 2016, pp. 219-225.
-
(2016)
Computer and Information Technology (CIT 2016
, pp. 219-225
-
-
Naik, N.1
Jenkins, P.2
Davies, P.3
Newell, D.4
-
19
-
-
84983339971
-
Web protocols and challenges of web latency in the web of things
-
Eighth International Conference on. IEEE
-
N. Naik, and P. Jenkins, "Web protocols and challenges of web latency in the web of things, " in Ubiquitous and Future Networks (ICUFN), 2016 Eighth International Conference on. IEEE, 2016, pp. 845-850.
-
(2016)
Ubiquitous and Future Networks (ICUFN 2016
, pp. 845-850
-
-
Naik, N.1
Jenkins, P.2
-
20
-
-
84915774545
-
On breaking saml: Be whoever you want to be
-
J. Somorovsky, A. Mayer, J. Schwenk, M. Kampmann, and M. Jensen, "On breaking saml: Be whoever you want to be." in USENIX Security Symposium, 2012, pp. 397-412.
-
(2012)
USENIX Security Symposium
, pp. 397-412
-
-
Somorovsky, J.1
Mayer, A.2
Schwenk, J.3
Kampmann, M.4
Jensen, M.5
-
23
-
-
84944734046
-
Security analysis of the saml single sign-on browser/artifact profile
-
Proceedings. 19th Annual. IEEE
-
T. Groß, "Security analysis of the saml single sign-on browser/artifact profile, " in Computer Security Applications Conference, 2003. Proceedings. 19th Annual. IEEE, 2003, pp. 298-307.
-
(2003)
Computer Security Applications Conference 2003
, pp. 298-307
-
-
Groß, T.1
-
24
-
-
84964420093
-
-
SANS. Online]. Available
-
SANS. (2003) Global information assurance certification paper. [Online]. Available: https://www:giac:org/paper/gsec/2876/saml-commonsecurity-language-web-services/104846
-
(2003)
Global Information Assurance Certification Paper
-
-
-
25
-
-
84995458933
-
A comprehensive formal security analysis of oauth 20
-
ACM
-
D. Fett, R. Küsters, and G. Schmitz, "A comprehensive formal security analysis of oauth 2.0, " in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016, pp. 1204-1215.
-
(2016)
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
, pp. 1204-1215
-
-
Fett, D.1
Küsters, R.2
Schmitz, G.3
-
26
-
-
85024499061
-
-
January 11 Online]. Available
-
R. Millman. (2016, January 11) Researchers find two flaws in OAuth 2.0. [Online]. Available: https://www:scmagazine:com/researchers-findtwo-flaws-in-oauth-20/article/530038/
-
(2016)
Researchers Find Two Flaws in OAuth 20
-
-
Millman, R.1
|