Said et al., 2022 - Google Patents
A multi-factor authentication-based framework for identity management in cloud applicationsSaid et al., 2022
View PDF- Document ID
- 10397473580187362544
- Author
- Said W
- Mostafa E
- Hassan M
- Mostafa A
- Publication year
- Publication venue
- Computers, Materials & Continua
External Links
Snippet
User's data is considered as a vital asset of several organizations. Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns. Service providers must ensure that both data and applications that will be stored …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kaaniche et al. | A blockchain-based data usage auditing architecture with enhanced privacy and availability | |
US5557765A (en) | System and method for data recovery | |
KR102219277B1 (en) | System and method for controlling the delivery of authenticated content | |
CN106888084B (en) | Quantum fort machine system and authentication method thereof | |
KR102549337B1 (en) | Systems and methods for biometric protocol standards | |
CN109688119A (en) | In a kind of cloud computing can anonymous traceability identity identifying method | |
KR20070024633A (en) | Renewable and Private Biometric | |
Manthiramoorthy et al. | Comparing several encrypted cloud storage platforms | |
Sauber et al. | A new secure model for data protection over cloud computing | |
Hussein et al. | A survey of cryptography cloud storage techniques | |
Said et al. | A multi-factor authentication-based framework for identity management in cloud applications | |
Akbarfam et al. | Dlacb: Deep learning based access control using blockchain | |
Park et al. | Combined authentication-based multilevel access control in mobile application for DailyLifeService | |
Sharma et al. | A Framework of Big Data as a Service Platform for Access Control & Privacy Protection Using Blockchain Network | |
Sehgal et al. | Cloud computing and information security | |
Johnson et al. | A secure distributed capability based system | |
Verma et al. | Applications of Data Security and Blockchain in Smart City Identity Management | |
Aljahdali et al. | Efficient and Secure Access Control for IoT-based Environmental Monitoring | |
Lyu et al. | NSSIA: A New Self‐Sovereign Identity Scheme with Accountability | |
KR20030097550A (en) | Authorization Key Escrow Service System and Method | |
CN110445756B (en) | Method for realizing searchable encryption audit logs in cloud storage | |
Kankal et al. | An adaptive authentication based on blockchain for bigdata hadoop framework | |
Yang et al. | New paradigm of inference control with trusted computing | |
Sirisha et al. | ’Protection of encroachment on bigdata aspects’ | |
Kumari et al. | A Review on Challenges of Security for Secure Data Storage in Cloud |