Enhancing the Access Privacy of IDaaS System Using SAML Protocol in Fog Computing
暂无分享,去创建一个
Fadi Al-Turjman | Ch. Rupa | Rizwan Patan | Leonardo Mostarda | F. Al-turjman | C. Rupa | Rizwan Patan | L. Mostarda
[1] Vidhyacharan Bhaskar,et al. Encrypted token based authentication with adapted SAML technology for cloud web services , 2017, J. Netw. Comput. Appl..
[2] Rajkumar Buyya,et al. Next generation cloud computing: New trends and research directions , 2017, Future Gener. Comput. Syst..
[3] Muhammad Tariq,et al. Light-Weight Security and Blockchain Based Provenance for Advanced Metering Infrastructure , 2019, IEEE Access.
[4] Chin-Chen Chang,et al. Privacy preserving weighted similarity search scheme for encrypted data , 2019, IET Inf. Secur..
[5] Zeeshan Ali,et al. Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles , 2020, IEEE Access.
[6] Rengarajan Amirtharajan,et al. DNA and Chaos Based Confusion-Diffusion for Color Image Security , 2019, 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN).
[7] Ch. Rupa,et al. Intensifying Multimedia Information Security Using Comprehensive Cipher , 2019, 2019 Innovations in Power and Advanced Computing Technologies (i-PACT).
[8] Thar Baker,et al. Analysis of Dimensionality Reduction Techniques on Big Data , 2020, IEEE Access.
[9] Muhammad Asif,et al. Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications , 2018, Secur. Commun. Networks.
[10] Kai Fan,et al. Lightweight NFC Protocol for Privacy Protection in Mobile IoT , 2018 .
[11] Amro Al-Said Ahmad,et al. Scalability analysis comparisons of cloud-based software services , 2019, J. Cloud Comput..
[12] Paulo Romero Martins Maciel,et al. Models for availability and power consumption evaluation of a private cloud with VMM rejuvenation enabled by VM Live Migration , 2018, The Journal of Supercomputing.
[13] Joel J. P. C. Rodrigues,et al. TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment , 2019, IEEE Transactions on Vehicular Technology.
[14] Ehsan Ullah Munir,et al. MOPT: list-based heuristic for scheduling workflows in cloud environment , 2018, The Journal of Supercomputing.
[15] Reza Parsamehr,et al. Mutual authentication protocol to share files in cloud storage , 2016, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[16] Jeremy M. Kaplan,et al. Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.
[17] Xu An Wang,et al. New provable data transfer from provable data possession and deletion for secure cloud storage , 2019, Int. J. Distributed Sens. Networks.
[18] Jian Shen,et al. Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure , 2017, IEEE Transactions on Big Data.
[19] Y. Yang,et al. Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems , 2012, IET Inf. Secur..
[20] David Pointcheval,et al. Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.
[21] Xiaohua Tian,et al. AMCloud: Toward a Secure Autonomic Mobile Ad Hoc Cloud Computing System , 2017, IEEE Wireless Communications.
[22] E Munivel,et al. New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing , 2019, Secur. Commun. Networks.
[23] Muhammad Tariq,et al. Detection of Epilepsy Seizures in Neo-Natal EEG Using LSTM Architecture , 2019, IEEE Access.
[24] Abdulrahman Al-Ahmari,et al. Computational System to Classify Cyber Crime Offenses using Machine Learning , 2020, Sustainability.
[25] Ao Fujiang,et al. An Improved Uniform Identity Authentication Method Based on SAML in Cloud Environment , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).
[26] Baoyuan Kang,et al. ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security , 2018, Wuhan University Journal of Natural Sciences.
[27] Vidhyacharan Bhaskar,et al. Identity and access management in cloud environment: Mechanisms and challenges , 2018 .
[28] Tao Xiang,et al. Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud , 2018, J. Parallel Distributed Comput..
[29] Behnam Bahrak,et al. An improved authentication protocol for distributed mobile cloud computing services , 2017, Int. J. Crit. Infrastructure Prot..
[30] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[31] Jian Shen,et al. Provable data transfer from provable data possession and deletion in cloud storage , 2017, Comput. Stand. Interfaces.
[32] Bin Li,et al. An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment , 2018, Wirel. Commun. Mob. Comput..
[33] Prasanta K. Jana,et al. A GSA based hybrid algorithm for bi-objective workflow scheduling in cloud computing , 2018, Future Gener. Comput. Syst..
[34] Jens Groth,et al. Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability , 2017, IACR Cryptol. ePrint Arch..
[35] Hui Guo,et al. Towards Secure Data Distribution Systems in Mobile Cloud Computing , 2017, IEEE Transactions on Mobile Computing.
[36] Fadi Al-Turjman. Smart Grid in IoT-Enabled Spaces : The Road to Intelligence in Power , 2020 .
[37] Ion Stoica,et al. DIZK: A Distributed Zero Knowledge Proof System , 2018, IACR Cryptol. ePrint Arch..
[38] Fadi Al-Turjman,et al. Correctness of an Authentication Scheme for Managing Demand Response in Smart Grid , 2020 .
[39] Bahram Rashidi. Authentication issues for cloud applications , 2019 .
[40] Gautam Srivastava,et al. KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks , 2020, IEEE Access.
[41] Mainak Adhikari,et al. A Survey on Scheduling Strategies for Workflows in Cloud Environment and Emerging Trends , 2019, ACM Comput. Surv..
[42] Ali Sunyaev,et al. Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing , 2016, IEEE Transactions on Cloud Computing.