Survey on User Authentication for Cloud Computing
Abstract
Keywords
Full Text:
PDFReferences
Alexa Huth, James Cebule,” The Basics of Cloud Computing,” The NIST Definition of Cloud Computing at http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800-145-cloud -definition,pp. 1-4, 2011.
Hyokyung Chang, Euiin Choi, “User Authentication in Cloud Computing”, Communications in Computer and Information Science, vol. 151, pp. 338-342, 2011.
Joao Paulo Barraca, Alfredo Matos, Rui L.Aguiar,” User Centric Community Clouds”, Wireless Pers Commun, vol. 58, pp. 31-48, 2011.
Hongwei Li, Yuanshun Dai, Ling Tian and Haomiao Yang,” Identity-Based Authentication for Cloud Computing”, International Conference on Cloud Computing, vol. 5931, pp.157-166, 2009.
Jin-Song Xu, Ru-Cheng Huang, Wan-Ming Huang, Geng Yang,” Secure Document Service for Cloud Computing”, International Conference on Cloud Computing, vol. 5931, pp.541-546, 2009.
Zhidong Shen, Qiang Tong, “The security of Cloud Computing System enabled by Trusted Computing Technology”, International Conference on Signal Processing Systems, pp. 11-15, 2010.
Dr.Gurdev Singh, Amit Sharma, Rajbrinder Singh,” Assorted Security Facets Associated with Cloud Database”, International Journal of Computer Science and Technology, vol. 2, pp. 72-76, September 2011.
Fred Cheng,” Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm”, Journal Mobile Networks and Applications, vol. 16, pp. 304-336, 2011.
Francesco Tusa, Antonio celesti, Rao Mikkilineni,” AAA in a Cloud-Based Virtual DIME Network Architecture (DNA)”, International Workshops on Enabling Technologies, 2011.
Sowmya Suryadevara, Shuchita Kapoor, Shweta Dhatterwal, Rohaila Naaz, Anand Sharma,” Tongue as a Biometric Virtualizes New Prospects of Cloud Computing Security”, International Conference on Information and Network Technology, Vol. 4, pp 73-78, 2011.
Zhen-Yu Wu, Yufang Chung, Feipei Lai, Tzer-Shyong Chen, “A Password-Based User Authentication Scheme for the Integrated EPR Information System”, Journal of Medical Systems, vol. 36, pp.631-638, 2012.
Liang Yan, Chunming Rong, Gansen Zhao,” Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical identity-Based Cryptography”, International Conference on Cloud Computing, vol. 5931, pp.167-177, 2009.
Ahmad-Reza Sadeghi, Thomas Schneider, Marcel Winandy,” Token-Based Cloud Computing: Secure Outsourcing of Data and Arbitrary Computations with Lower Latency,” International Conference on Trust and Trustworthy Computing, vol. 6101, pp.417-429, 2010.
Mahbub Ahmed, Yang Xiang, Shawkat Ali,” Above the Trust and Security in Cloud Computing: A Notion towards Innovation”, International Conference on Embedded and Ubiquitous Computing, pp. 723-730, 2010.
Danny Harnik, Elliot K.Kolodner, Shahar Ronen, Julian Satran, Alexandra Shulman-Peleg, Sivan Tal,” Secure Access Mechanism for Cloud Storage”, Workshop on Software Service: Cloud Computing and Applications Based on Software Services, Vol. 12, pp. 317–336, June 2011.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.