Khalid et al., 2013 - Google Patents
Cloud based secure and privacy enhanced authentication & authorization protocolKhalid et al., 2013
View PDF- Document ID
- 11943502109404810975
- Author
- Khalid U
- Ghafoor A
- Irum M
- Shibli M
- Publication year
- Publication venue
- Procedia Computer Science
External Links
Snippet
Cloud computing is an emerging computing model which facilitates organizations and the IT industry. It helps them to multiply or lessen their resources according to their operational requirements. However, the organizations are reluctant to store their sensitive information on …
- 238000004891 communication 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khalid et al. | Cloud based secure and privacy enhanced authentication & authorization protocol | |
Gao et al. | Blockchain based IIoT data sharing framework for SDN-enabled pervasive edge computing | |
Carretero et al. | Federated identity architecture of the European eID system | |
Bernabe et al. | Holistic Privacy-Preserving Identity Management System for the Internet of Things. | |
David et al. | Cloud Security Service for Identifying Unauthorized User Behaviour. | |
Sun et al. | Outsourced decentralized multi-authority attribute based signature and its application in IoT | |
US11411746B2 (en) | Systems, methods, and storage media for permissioned delegation in a computing environment | |
US20080263644A1 (en) | Federated authorization for distributed computing | |
Tong et al. | CCAP: a complete cross-domain authentication based on blockchain for Internet of Things | |
Sanchez et al. | Towards privacy preserving data provenance for the Internet of Things | |
Quan et al. | A secure user authentication protocol for sensor network in data capturing | |
Chattaraj et al. | HEAP: an efficient and fault-tolerant authentication and key exchange protocol for Hadoop-assisted big data platform | |
Tang et al. | Privacy-preserving authentication scheme based on zero trust architecture | |
Bharill et al. | A secure key for cloud using threshold cryptography in Kerberos | |
Zwattendorfer et al. | The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality | |
Vossaert et al. | User-centric identity management using trusted modules | |
Fu et al. | Non-transferable blockchain-based identity authentication | |
Otta et al. | Cloud identity and access management solution with blockchain | |
Hossain et al. | LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator | |
Kaaniche et al. | Id-based user-centric data usage auditing scheme for distributed environments | |
Pervez et al. | Oblivious access control policies for cloud based data sharing systems | |
Lahmer et al. | Towards a virtual domain based authentication on MapReduce | |
Buccafurri et al. | Implementing advanced electronic signature by public digital identity system (SPID) | |
Liang et al. | An efficient blockchain-based anonymous authentication and supervision system | |
Zhang et al. | TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy |