Accesso libero

Advanced Secure User Authentication Framework for Cloud Computing

   | 05 set 2013
INFORMAZIONI SU QUESTO ARTICOLO

Cita

Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia, "A view of cloud computing", Communications of the ACM, 53 (4), 2010, pp.50-58.10.1145/1721654.1721672 Search in Google Scholar

Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn, “Secure Cloud: Towards a Comprehensive Security Framework for Cloud Computing Environments”, Proceedings of 34th IEEE Conference Workshops on Computer Software and Applications, 19-23 July, 2010, Pittsburgh, PA, USA, pp. 393-398.10.1109/COMPSACW.2010.74 Search in Google Scholar

Chun-Ting Huang, Zhongyuan Qin, C.-C. Jay Ku, “Multimedia Storage Security in Cloud computing: An Overview”, Proceedings of 13th IEEE International Workshop on Multimedia Signal Processing, 17-19 October, 2011, Los Angles, CA, USA, pp.1-6.10.1109/MMSP.2011.6093775Search in Google Scholar

Jack Newton, “Beyond Passwords: Two Factor Authentication Comes to the Cloud”, http:// www.slaw.ca /2010 /09/20/, 2010. Search in Google Scholar

L. Lamport, “Password authentication with insecure communication”, Communications of the ACM, 24 (11), 1981, pp. 770–771.10.1145/358790.358797 Search in Google Scholar

M.S. Hwang, and L.H. Li, “A New Remote User Authentication Scheme using Smart Cards”, IEEE Transactions on Consumer Electronics, 46 (1), 2000, pp.28-30.10.1109/30.826377 Search in Google Scholar

H.Y. Chien, J.K. Jan, Y.M. Tseng, “An efficient and practical solution to remote authentication smart card”, Computers & Security, 21(4), 2002, pp. 372–375.10.1016/S0167-4048(02)00415-7 Search in Google Scholar

W.C. Ku, S.M. Chen, “Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards”, IEEE Transactions on Consumer Electronics, 50 (1), 2004, pp.204–207.10.1109/TCE.2004.1277863 Search in Google Scholar

C. Mitchell, “Limitations of challenge-response entity authentication”, Electronic Letters, 25 (17), 1989, pp. 1195–1196.10.1049/el:19890801 Search in Google Scholar

W.C. Ku, C.M. Chen, H.L. Lee, “Cryptanalysis of a variant of Peyravian–Zunic’s password authentication scheme”, IEICE Transactions on Communication, E86-B (5), 2003, pp.1682–1684. Search in Google Scholar

T. H. Chen and J. C. Huang, “A novel user-participating authentication scheme,” The Journal of Systems and Software, 83(5), 2010, pp.861–867.10.1016/j.jss.2009.12.022 Search in Google Scholar

Chun-Ta Li, Cheng-Chi Lee, “A robust remote user authentication scheme using smart card”, Information Technology and Control, 40 (3), 2011, pp. 236-245.10.5755/j01.itc.40.3.632 Search in Google Scholar

H. C. Hsiang and W. K. Shih, “Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards,” Computer Communications, 32(4), 2009, pp. 649–652.10.1016/j.comcom.2008.11.019 Search in Google Scholar

Amlan Jyoti Choudhury, Pardeep Kumar, Managal Sain, Hyotaek Lim, Hoon Jae-Lee, “A Strong User Authentication Framework for Cloud Computing”, Proceedings of 2011 IEEE Asia-Pacific Services Computing Conference, Jeju, South Korea, December 12-15, 2011, pp.110-115.10.1109/APSCC.2011.14 Search in Google Scholar

I-En Liao, Cheng-Chi Lee, Min-Shiang Hwang, “A password authentication scheme over insecure networks”, Journal of Computer and System Sciences , 72(4), 2006, pp.727-740.10.1016/j.jcss.2005.10.001 Search in Google Scholar

S21sec, “ZeuS Mitmo: Man-in-the-mobile”, http: //securityblog.s21sec.com/2010/09/zeus–man – in – mobile –i.html, 2011. Search in Google Scholar

Szu-yu Lin, “Enhancing the security of out-of-band one-time password two factor authentication in cloud computing”, http://pc01.lib.ntust.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-153542, 2011. Search in Google Scholar

F. T. Fábrega, J. Herzog, and J. Guttman, “Strand spaces: Proving security protocols correct,” Journal of Computer Security, 7(2/3), 1999, pp.191–230.10.3233/JCS-1999-72-304 Search in Google Scholar

J. D. Guttman and F. J. Thayer Fabrega, “Authentication tests and the structure of bundles”, Theoretical Computer Science, 283(2), 2002, pp.333-380.10.1016/S0304-3975(01)00139-6Search in Google Scholar

eISSN:
1178-5608
Lingua:
Inglese
Frequenza di pubblicazione:
Volume Open
Argomenti della rivista:
Engineering, Introductions and Overviews, other