"A User Identity Management Protocol for Cloud Computing Paradigm"
written by Safiriyu Eludiora, Olatunde Abiona, Ayodeji Oluwatope, Adeniran Oluwaranti, Clement Onime, Lawrence Kehinde,
published by International Journal of Communications, Network and System Sciences, Vol.4 No.3, 2011
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Multi-tier Authentication for Cloud Security
2020
[2] Security and Privacy Analyzed Cloud Framework Design and Implementation for Ethiopian Universities
2019
[3] CONCEPTUAL ORIENTED ANALYSIS ON THE IMPACT ON THE CLOUD SECURITY ON THE CYBER ATTACKS
Journal of Analysis and Computation (JAC), 2019
[4] A 3-LEVEL MULTIFACTOR AUTHENTICATION SCHEME FOR CLOUD COMPUTING
2019
[5] Continuous Identity Verification in Cloud Computing Services
2018
[6] Engineering Science and Technology, an International Journal
2018
[7] Research on the system of smart city park based on cloud computing
Cluster Computing, 2018
[8] FURNISHING CERTAINTY TO SKIPCLOUD BY DEPLOYING VISUAL CRYPTOGRAPHY TACTICS
International Journal of Computer Engineering and Applications, 2018
[9] Identity and access management in cloud environment: Mechanisms and challenges
Engineering Science and Technology, an International Journal, 2018
[10] Cloud Computing: Governance, Risk Management and Audit of IT Services
2017
[11] Collaboration technologies for secure road traffic congestion control system in Egypt
2017
[12] Improving privacy and trust in federated identity using SAML with hash based encryption algorithm
2017
[13] A Systematic Literature Review of the Data Replication Techniques in the Cloud Environments
Big Data Research, 2017
[14] Role of Agents to Enhance the Security and Scalability in Cloud Environment
2017
[15] Evaluation of Secure Cloud Transmission Protocol
International Journal of Computer Network and Information Security, 2017
[16] IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
International Journal On Cloud Computing: Services And Architecture, 2017
[17] Security Threats in Cloud & P2P Computing
International Journal of Computer Science and Information Security, 2016
[18] Investigating the Barriers of Application of Cloud Computing in the Smart Schools of Iran
International Journal of Advanced Networking and Applications, 2016
[19] Cryptographic Protocols for Secure Cloud Computing
International Journal of Security and Its Applications, 2016
[20] A comprehensive review of the data replication techniques in the cloud environments
Journal of Network and Computer Applications, 2016
[21] A comprehensive review of the data replication techniques in the cloud environments: Major trends and future directions
Journal of Network and Computer Applications, 2016
[22] College of Natural Sciences
Thesis, 2016
[23] Multi-Objective Task Scheduling in Cloud Computing Using an Imperialist Competitive Algorithm
International Journal of Advanced Computer Science and Applications, 2016
[24] Cryptographic Protocols for Secure Cloud Computing.
2016
[25] A Secure Interactive Architecture for Vehicular Cloud Environment
2016
[26] Enterprise Cloud Adoption: A Quantitative Exploratory Research
Handbook of Research on Architectural Trends in Service-Driven Computing, 2016
[27] Cloud Data Security Framework for Payment Card System: the case of Ethiopia
Thesis, 2016
[28] Digital Identity in Cloud Computing
Digital Identity Management, 2015
[29] Analysis of Security and Privacy in Public Cloud Environment
Cloud Computing (ICCC), 2015 International Conference on, 2015
[30] Online Monitoring And Counting Of Voting Using Zigbee Protocol And Cloud Computing.
International Journal of Applied Engineering Research, 2015
[31] A cloud security framework based on trust model and mobile agent
Cloud Technologies and Applications (CloudTech), 2015 International Conference on, 2015
[32] Identity Management in Cloud Computing: Issues, Incidents and Solutions
2015
[33] Digital Identity Management
2015
[34] Preserving Data in Cloud Computing
2015
[35] A phenomenological study on interplay between IT governance and Cloud implementation in enterprises
ProQuest Dissertations Publishing, 2015
[36] Multi-Level authentication in Cloud Computing using 3D security
2015
[37] Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey
Journal of Network and Computer …, 2014
[38] Enhancing Security in Cloud Computing Using Multilevel Authentication
Y Patel, N Sethi - ijeecse.com, 2014
[39] SURVEY ON SECURED DATA STORAGE USING IDENTITY MANAGEMENT FOR MOBILE CLOUD COMPUTING ENVIRONMENT
PS Kadam, MV Bramhe - ijcitb.com, 2014
[40] Optimized Privacy Preservation for Identity Management with Multi Agent Structures in Cloud Computing
2014
[41] Rainfall Prediction Using Artificial Neural Network.
International Journal of Applied Engineering Research, 2014
[42] Cloud computing: Security model comprising governance, risk management and compliance
Data Mining and Intelligent Computing (ICDMIC), 2014 International Conference on, 2014
[43] A User Identity Management Protocol Using Efficient Dynamic Credentials
SS Dharwadkar, RM Jogdand - ijser.in, 2014
[44] Agent Based Information Retrieval in a Cloud: A Theoretical Framework for an Institutional Repository
MN Mahdi, AR Ahmad, R Ismail - ijetae.com, 2014
[45] Digital Identity Management in Cloud
2014
[46] The effects of gender, age, and education on cloud computing adoption: A correlational study
2014
[47] Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing
International Journal of computational Engineering research (IJCER), 2013
[48] The major security challenges to cloud computing.
2013
[49] A gateway-based access control scheme for collaborative clouds
ICIMP 2012 : The Seventh International Conference on Internet Monitoring and Protection, 2012
[50] Multi-dimensional Password Generation Technique for accessing cloud services
arXiv preprint arXiv:1207.3636, 2012
[51] COMPUTAÇÃO NAS NUVENS NA CONSTRUÇÃO CIVIL: ESTUDO EXPLORATÓRIO DE POTENCIALIDADES DOS RECURSOS GRATUITOS DA AUTODESK CLOUD
Encontro Nacional de Tecnologia do Ambiente Construído, 2012
[52] An analysis of security, cost-effectiveness, and it compliance factors influencing cloud adoption by it managers
2012
[53] Cloud MA-MOrBAC: A Cloud Distributed Access Control Model Based on Mobile Agents
[54] COMPUTAÇÃO NAS NUVENS NA CONSTRUÇÃO CIVIL: ESTUDO EXPLORATÓRIO DE POTENCIALIDADES DOS RECURSOS GRATUITOS DA …