A Consolidated Authentication Model in Cloud Computing Environments
暂无分享,去创建一个
[1] Harit Shah,et al. Security Issues on Cloud Computing , 2013, ArXiv.
[2] Marcel Adam Just,et al. Securely available credentials---credential server framework , 2001 .
[3] Dae-Joon Hwang,et al. Trends in M2M Application Services Based on a Smart Phone , 2010, FGIT-ASEA.
[4] Constantin Popescu. A Secure Proxy Signature Scheme with Delegation by Warrant , 2011 .
[5] Deepak Singh Chouhan,et al. Building Trust In Cloud Using Public Key Infrastructure - A step towards cloud trust , 2012 .
[6] Dae Heon Bae. A Study on the Revision of the 'Personal Information Protection Act' and its Related Acts , 2012 .
[7] Stephen Farrell,et al. Securely Available Credentials - Requirements , 2001, RFC.
[8] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[9] T. Grance,et al. SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .
[10] Seng-Phil Hong,et al. A Method of Risk Assessment for Multi-Factor Authentication , 2011, J. Inf. Process. Syst..
[11] Pkcs 12 V1.0: Personal Information Exchange Syntax Pkcs 12 V1.0: Personal Information Exchange Syntax 2 , 2022 .