[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Khalid et al., 2013 - Google Patents

Cloud based secure and privacy enhanced authentication & authorization protocol

Khalid et al., 2013

View PDF
Document ID
11943502109404810975
Author
Khalid U
Ghafoor A
Irum M
Shibli M
Publication year
Publication venue
Procedia Computer Science

External Links

Snippet

Cloud computing is an emerging computing model which facilitates organizations and the IT industry. It helps them to multiply or lessen their resources according to their operational requirements. However, the organizations are reluctant to store their sensitive information on …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Similar Documents

Publication Publication Date Title
Khalid et al. Cloud based secure and privacy enhanced authentication & authorization protocol
Gao et al. Blockchain based IIoT data sharing framework for SDN-enabled pervasive edge computing
Carretero et al. Federated identity architecture of the European eID system
Bernabe et al. Holistic Privacy-Preserving Identity Management System for the Internet of Things.
David et al. Cloud Security Service for Identifying Unauthorized User Behaviour.
Sun et al. Outsourced decentralized multi-authority attribute based signature and its application in IoT
US11411746B2 (en) Systems, methods, and storage media for permissioned delegation in a computing environment
US20080263644A1 (en) Federated authorization for distributed computing
Tong et al. CCAP: a complete cross-domain authentication based on blockchain for Internet of Things
Sanchez et al. Towards privacy preserving data provenance for the Internet of Things
Quan et al. A secure user authentication protocol for sensor network in data capturing
Chattaraj et al. HEAP: an efficient and fault-tolerant authentication and key exchange protocol for Hadoop-assisted big data platform
Tang et al. Privacy-preserving authentication scheme based on zero trust architecture
Bharill et al. A secure key for cloud using threshold cryptography in Kerberos
Zwattendorfer et al. The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality
Vossaert et al. User-centric identity management using trusted modules
Fu et al. Non-transferable blockchain-based identity authentication
Otta et al. Cloud identity and access management solution with blockchain
Hossain et al. LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator
Kaaniche et al. Id-based user-centric data usage auditing scheme for distributed environments
Pervez et al. Oblivious access control policies for cloud based data sharing systems
Lahmer et al. Towards a virtual domain based authentication on MapReduce
Buccafurri et al. Implementing advanced electronic signature by public digital identity system (SPID)
Liang et al. An efficient blockchain-based anonymous authentication and supervision system
Zhang et al. TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy