An Analysis of Security Related Issues in Cloud Computing
暂无分享,去创建一个
[1] Ammar Khalid. Cloud Computing: Applying Issues in Small Business , 2010, 2010 International Conference on Signal Acquisition and Processing.
[2] Jörg Schwenk,et al. Stronger TLS bindings for SAML assertions and SAML artifacts , 2008, SWS '08.
[3] Aviel D. Rubin,et al. Risks of the Passport single signon protocol , 2000, Comput. Networks.
[4] Jörg Schwenk,et al. TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management , 2008, BIOSIG.
[5] Martín Abadi,et al. Code-Carrying Authorization , 2008, ESORICS.
[6] Jörg Schwenk,et al. Risks of the CardSpace Protocol , 2009, ISC.
[7] M. Eloff,et al. Internet of people, things and services - the convergence of security, trust and privacy , 2009 .
[8] Mitchell Kapor,et al. The self-governing Internet: coordination by design , 1997 .
[9] Siani Pearson,et al. Towards accountable management of identity and privacy: sticky policies and enforceable tracing services , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[10] Thomas Groß,et al. Security analysis of the SAML single sign-on browser/artifact profile , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[11] Sebastian Gajek,et al. On the Insecurity of Microsoft's Identity Metasystem , 2008 .
[12] Dmitri Botvich,et al. Trust and Privacy , 2012, Collaborative Financial Infrastructure Protection.
[13] John McCarthy,et al. Recursive functions of symbolic expressions and their computation by machine, Part I , 1960, Commun. ACM.
[14] Tom Scavo,et al. SAML V2.0 Holder-of-Key Web Browser SSO Profile Version 1.0 , 2009 .
[15] Tibor Jager,et al. A Browser-Based Kerberos Authentication Scheme , 2008, ESORICS.