Identity management systems for the internet of things: a survey towards blockchain solutions

X Zhu, Y Badr - Sensors, 2018‏ - mdpi.com
The Internet of Things aims at connecting everything, ranging from individuals,
organizations, and companies to things in the physical and virtual world. The digital identity …

BAuth-ZKP—A blockchain-based multi-factor authentication mechanism for securing smart cities

MO Ahmad, G Tripathi, F Siddiqui, MA Alam, MA Ahad… - Sensors, 2023‏ - mdpi.com
The overwhelming popularity of technology-based solutions and innovations to address day-
to-day processes has significantly contributed to the emergence of smart cities. where …

A survey on blockchain-based identity management and decentralized privacy for personal data

K Gilani, E Bertin, J Hatin… - 2020 2nd Conference on …, 2020‏ - ieeexplore.ieee.org
In the digital revolution, even secure communication between individuals, services and
devices through centralized digital entities presents considerable risks. Having service …

Cloud identity management security issues & solutions: a taxonomy

U Habiba, R Masood, MA Shibli, MA Niazi - Complex Adaptive Systems …, 2014‏ - Springer
Purpose Cloud computing systems represent one of the most complex computing systems
currently in existence. Current applications of Cloud involve extensive use of distributed …

Autonomic identity framework for the internet of things

X Zhu, Y Badr, J Pacheco… - … Conference on Cloud and …, 2017‏ - ieeexplore.ieee.org
The Internet of Things (IoT) will connect not only computers and mobile devices, but it will
also interconnect smart buildings, houses, and cities, as well as electrical grids, gas plants …

A survey on blockchain-based identity management systems for the Internet of Things

X Zhu, Y Badr - 2018 IEEE International Conference on Internet …, 2018‏ - ieeexplore.ieee.org
The Internet of Things aims at connecting everything ranging from individuals, organizations,
companies to things in the physical and virtual world. The digital identity has always been …

Cloud identity management: A survey on privacy strategies

J Werner, CM Westphall, CB Westphall - Computer Networks, 2017‏ - Elsevier
With the rise of cloud computing, thousands of users and multiple applications have sought
to communicate with each other, exchanging sensitive data. Thus, for effectively managing …

Cloud based secure and privacy enhanced authentication & authorization protocol

U Khalid, A Ghafoor, M Irum, MA Shibli - Procedia Computer Science, 2013‏ - Elsevier
Cloud computing is an emerging computing model which facilitates organizations and the IT
industry. It helps them to multiply or lessen their resources according to their operational …

A survey on security issues of federated identity in the cloud computing

E Ghazizadeh, M Zamani… - 4th IEEE International …, 2012‏ - ieeexplore.ieee.org
Cloud computing is a new generation of the technology that has been designed to cater for
commercial necessities and to run suitable applications or solve IT management issues …

[کتاب][B] Targeted advertising technologies in the ICT Space: A use case driven analysis

C Schlee - 2013‏ - books.google.com
In recent years, the field of information and communication technology has started to change
dramatically. Carriers are threatened by high revenue losses requiring them to identify new …