A User Identity Management Protocol for Cloud Computing Paradigm
暂无分享,去创建一个
Clement E. Onime | Safiriyu Eludiora | Lawrence O. Kehinde | Ayodeji Oludola Oluwatope | Olatunde O. Abiona | Adeniran Isola Oluwaranti | A. O. Oluwatope | L. Kehinde | A. Oluwaranti | C. Onime | O. Abiona | S. Eludiora | A. Oluwatope
[1] Prashant Pandey,et al. Cloud computing , 2010, ICWET.
[2] K. Shahu Chatrapati,et al. Architectural Strategies on Cloud Computing , 2012 .
[3] Server Virtualization and Cloud Computing Four hidden impacts on uptime and availability , .
[4] Frank Gens,et al. Cloud Computing Benefits, risks and recommendations for information security , 2010 .
[5] P. Venkataram,et al. An Authentication Scheme for Ubiquitous Commerce: A Cognitive Agents Based Approach , 2008, NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops.
[6] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[7] Georg Treu,et al. Implicit Authorization for Social Location Disclosure , 2008, J. Softw..