[1]
|
USER CENTRIC APPROACH TO IDENTITY MANAGEMENT IN CLOUD COMPUTING ENVIRONMENT: AN EMPIRICALLY TESTED FRAMEWORK
|
|
EDPACS,
2024 |
|
|
[2]
|
Authentication model for secure data access using blowfish and elliptic curve diffie hellman key exchange algorithm
|
|
AIP Conference Proceedings,
2024 |
|
|
[3]
|
Industrial Internet of Things and its applications in Industry 4.0 through sensor integration for a process parameter monitor and control
|
|
Modern Computational …,
2024 |
|
|
[4]
|
Cloud Identity Management Mechanisms and Issues
|
|
Yahyaoui - 2023 IEEE 6th International …,
2023 |
|
|
[5]
|
Privacy-Aware Cloud Architecture for Collaborative Use of Patients' Health Information
|
|
Applied Sciences,
2023 |
|
|
[6]
|
DAuth—Delegated Authorization Framework for Secured Serverless Cloud Computing
|
|
Wireless Personal Communications,
2023 |
|
|
[7]
|
Sharing PHR Data in Cloud Using Sigmoid Key and Median Support Signature-Based Cryptosystem
|
|
Wireless Personal Communications,
2022 |
|
|
[8]
|
Privacy Preserving Security Integrating Method with Varying Key Encryption Model in Cloud
|
|
2022 International Conference on …,
2022 |
|
|
[9]
|
Uma proposta de análise do ciclo de vida de credenciais em redes LoraWan privadas para IIoT
|
|
Anais da XIX Escola Regional de Redes de …,
2021 |
|
|
[10]
|
Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
|
|
Electronics,
2021 |
|
|
[11]
|
Microsoft Azure active directory for next level authentication to provide a seamless single sign-on experience
|
|
Applied Nanoscience,
2021 |
|
|
[12]
|
A Zero-Trust Federated Identity and Access Management Framework for Cloud and Cloud-based Computing Environments
|
|
2020 |
|
|
[13]
|
Cloud MA-MOrBAC: A Cloud Distributed Access Control Model Based on Mobile Agents
|
|
2020 |
|
|
[14]
|
Multi-tier Authentication for Cloud Security
|
|
2020 |
|
|
[15]
|
Distributed Denial of Service Attacks in Cloud Computing
|
|
(IJACSA) International Journal of Advanced Computer Science and Applications,
2020 |
|
|
[16]
|
Cloud MA-MOrBAC: A Cloud Distributed Access Control Model Based on Mobile Agents.
|
|
Int. J. Web Appl.,
2020 |
|
|
[17]
|
Ensuring Data Security in Cloud Computing using Homomorphic Encryption
|
|
2020 |
|
|
[18]
|
Security and Privacy Analyzed Cloud Framework Design and Implementation for Ethiopian Universities
|
|
2019 |
|
|
[19]
|
CONCEPTUAL ORIENTED ANALYSIS ON THE IMPACT ON THE CLOUD SECURITY ON THE CYBER ATTACKS
|
|
Journal of Analysis and Computation (JAC),
2019 |
|
|
[20]
|
A 3-LEVEL MULTIFACTOR AUTHENTICATION SCHEME FOR CLOUD COMPUTING
|
|
2019 |
|
|
[21]
|
Continuous Identity Verification in Cloud Computing Services
|
|
2018 |
|
|
[22]
|
Research on the system of smart city park based on cloud computing
|
|
Cluster Computing,
2018 |
|
|
[23]
|
Identity and access management in cloud environment: Mechanisms and challenges
|
|
Engineering Science and Technology, an International Journal,
2018 |
|
|
[24]
|
FURNISHING CERTAINTY TO SKIPCLOUD BY DEPLOYING VISUAL CRYPTOGRAPHY TACTICS
|
|
International Journal of Computer Engineering and Applications,
2018 |
|
|
[25]
|
SOME APPROACHES FOR AUTHENTICATION IN CLOUD COMPUTING
|
|
2018 |
|
|
[26]
|
USE OF ACCESS CONTROL LIST ON NETWORK BANDWIDTH MANA GEMENT IN HIGHER PUBLIC EDUCATION INSTITUTIONS IN ETHIO PIA: THE CASE OF …
|
|
2018 |
|
|
[27]
|
USE OF ACCESS CONTROL LIST ON NETWORK BANDWIDTH MANA GEMENT IN HIGHER PUBLIC EDUCATION INSTITUTIONS IN ETHIO PIA: THE …
|
|
2018 |
|
|
[28]
|
A Secure Client Aware Certification for Mobile Cloud Offloading Decision.
|
|
International Journal of …,
2017 |
|
|
[29]
|
Improving privacy and trust in federated identity using SAML with hash based encryption algorithm
|
|
2017 |
|
|
[30]
|
Collaboration technologies for secure road traffic congestion control system in Egypt
|
|
2017 |
|
|
[31]
|
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
|
|
International Journal On Cloud Computing: Services And Architecture,
2017 |
|
|
[32]
|
A Systematic Literature Review of the Data Replication Techniques in the Cloud Environments
|
|
Big Data Research,
2017 |
|
|
[33]
|
Evaluation of Secure Cloud Transmission Protocol
|
|
International Journal of Computer Network and Information Security,
2017 |
|
|
[34]
|
Role of Agents to Enhance the Security and Scalability in Cloud Environment
|
|
2017 |
|
|
[35]
|
Cloud Computing: Governance, Risk Management and Audit of IT Services
|
|
2017 |
|
|
[36]
|
Multi-Objective Task Scheduling in Cloud Computing Using an Imperialist Competitive Algorithm
|
|
International Journal of Advanced Computer Science and Applications,
2016 |
|
|
[37]
|
College of Natural Sciences
|
|
Thesis,
2016 |
|
|
[38]
|
Security Threats in Cloud & P2P Computing
|
|
International Journal of Computer Science and Information Security,
2016 |
|
|
[39]
|
A comprehensive review of the data replication techniques in the cloud environments
|
|
Journal of Network and Computer Applications,
2016 |
|
|
[40]
|
Cryptographic Protocols for Secure Cloud Computing
|
|
International Journal of Security and Its Applications,
2016 |
|
|
[41]
|
Investigating the Barriers of Application of Cloud Computing in the Smart Schools of Iran
|
|
International Journal of Advanced Networking and Applications,
2016 |
|
|
[42]
|
Cloud Data Security Framework for Payment Card System: the case of Ethiopia
|
|
Thesis,
2016 |
|
|
[43]
|
Enterprise Cloud Adoption: A Quantitative Exploratory Research
|
|
Handbook of Research on Architectural Trends in Service-Driven Computing,
2016 |
|
|
[44]
|
A Secure Interactive Architecture for Vehicular Cloud Environment
|
|
2016 |
|
|
[45]
|
A comprehensive review of the data replication techniques in the cloud environments: Major trends and future directions
|
|
Journal of Network and Computer Applications,
2016 |
|
|
[46]
|
Cryptographic Protocols for Secure Cloud Computing.
|
|
2016 |
|
|
[47]
|
A cloud security framework based on trust model and mobile agent
|
|
Cloud Technologies and Applications (CloudTech), 2015 International Conference on,
2015 |
|
|
[48]
|
Online Monitoring And Counting Of Voting Using Zigbee Protocol And Cloud Computing.
|
|
International Journal of Applied Engineering Research,
2015 |
|
|
[49]
|
Analysis of Security and Privacy in Public Cloud Environment
|
|
Cloud Computing (ICCC), 2015 International Conference on,
2015 |
|
|
[50]
|
Multi-Level authentication in Cloud Computing using 3D security
|
|
2015 |
|
|
[51]
|
Identity Management in Cloud Computing: Issues, Incidents and Solutions
|
|
2015 |
|
|
[52]
|
Digital Identity Management
|
|
2015 |
|
|
[53]
|
Preserving Data in Cloud Computing
|
|
2015 |
|
|
[54]
|
A phenomenological study on interplay between IT governance and Cloud implementation in enterprises
|
|
ProQuest Dissertations Publishing,
2015 |
|
|
[55]
|
Digital Identity in Cloud Computing
|
|
Digital Identity Management,
2015 |
|
|
[56]
|
Rainfall Prediction Using Artificial Neural Network.
|
|
International Journal of Applied Engineering Research,
2014 |
|
|
[57]
|
Digital Identity Management in Cloud
|
|
2014 |
|
|
[58]
|
Optimized Privacy Preservation for Identity Management with Multi Agent Structures in Cloud Computing
|
|
2014 |
|
|
[59]
|
Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey
|
|
Journal of Network and Computer …,
2014 |
|
|
[60]
|
SURVEY ON SECURED DATA STORAGE USING IDENTITY MANAGEMENT FOR MOBILE CLOUD COMPUTING ENVIRONMENT
|
|
PS Kadam, MV Bramhe - ijcitb.com,
2014 |
|
|
[61]
|
Enhancing Security in Cloud Computing Using Multilevel Authentication
|
|
Y Patel, N Sethi - ijeecse.com,
2014 |
|
|
[62]
|
Agent Based Information Retrieval in a Cloud: A Theoretical Framework for an Institutional Repository
|
|
MN Mahdi, AR Ahmad, R Ismail - ijetae.com,
2014 |
|
|
[63]
|
A User Identity Management Protocol Using Efficient Dynamic Credentials
|
|
SS Dharwadkar, RM Jogdand - ijser.in,
2014 |
|
|
[64]
|
Cloud computing: Security model comprising governance, risk management and compliance
|
|
Data Mining and Intelligent Computing (ICDMIC), 2014 International Conference on,
2014 |
|
|
[65]
|
The effects of gender, age, and education on cloud computing adoption: A correlational study
|
|
2014 |
|
|
[66]
|
Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing
|
|
International Journal of computational Engineering research (IJCER),
2013 |
|
|
[67]
|
The major security challenges to cloud computing.
|
|
NULL
2013 |
|
|
[68]
|
Multi-dimensional Password Generation Technique for accessing cloud services
|
|
arXiv preprint arXiv:1207.3636,
2012 |
|
|
[69]
|
A gateway-based access control scheme for collaborative clouds
|
|
ICIMP 2012 : The Seventh International Conference on Internet Monitoring and Protection,
2012 |
|
|
[70]
|
An analysis of security, cost-effectiveness, and it compliance factors influencing cloud adoption by it managers
|
|
2012 |
|
|
[71]
|
COMPUTAÇÃO NAS NUVENS NA CONSTRUÇÃO CIVIL: ESTUDO EXPLORATÓRIO DE POTENCIALIDADES DOS RECURSOS GRATUITOS DA AUTODESK CLOUD
|
|
Encontro Nacional de Tecnologia do Ambiente Construído,
2012 |
|
|
[72]
|
Mechanisms and Difficulties for Cloud Computing Information Protection and Access Control
|
|
|
|
|
[73]
|
COMPUTAÇÃO NAS NUVENS NA CONSTRUÇÃO CIVIL: ESTUDO EXPLORATÓRIO DE POTENCIALIDADES DOS RECURSOS GRATUITOS DA …
|
|
RSS de Melo
|
|
|