An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment
暂无分享,去创建一个
Junggab Son | Heekuck Oh | Hunmin Kim | Jaekyung Lee | Hunmin Kim | Junggab Son | H. Oh | Jaekyung Lee
[1] Schahram Dustdar,et al. Winds of Change: From Vendor Lock-In to the Meta Cloud , 2013, IEEE Internet Computing.
[2] Jörg Schwenk,et al. On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[3] J. Suresh Babu,et al. Migration from Single-Cloud to Multi-Cloud Computing , 2013 .
[4] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[5] Bernd Zwattendorfer,et al. Secure cross-cloud single sign-on (SSO) using eIDs , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[6] Krishnashree Achuthan,et al. Preventing Insider Attacks in the Cloud , 2011, ACC.
[7] K. Venkat Rao,et al. Innovation in cloud computing: Implementation of Kerberos version5in cloud computing in order to enhance the security issues , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[8] Jin Tong,et al. NIST Cloud Computing Reference Architecture , 2011, 2011 IEEE World Congress on Services.
[9] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[10] Jörg Schwenk,et al. Security Prospects through Cloud Computing by Adopting Multiple Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[11] Pascal Urien,et al. An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards , 2010, 2010 Fifth International Conference on Digital Telecommunications.
[12] Benny Rochwerger,et al. Reservoir - When One Cloud Is Not Enough , 2011, Computer.
[13] Hyotaek Lim,et al. Two Factor Authentication for Cloud Computing , 2010, J. Inform. and Commun. Convergence Engineering.