Security and privacy of sensitive data in cloud computing: a survey of recent developments
Cloud computing is revolutionizing many ecosystems by providing organizations with
computing resources featuring easy deployment, connectivity, configuration, automation and …
computing resources featuring easy deployment, connectivity, configuration, automation and …
Continuous and transparent multimodal authentication: reviewing the state of the art
Individuals, businesses and governments undertake an ever-growing range of activities
online and via various Internet-enabled digital devices. Unfortunately, these activities …
online and via various Internet-enabled digital devices. Unfortunately, these activities …
Trajectons: Action recognition through the motion analysis of tracked features
P Matikainen, M Hebert… - 2009 IEEE 12th …, 2009 - ieeexplore.ieee.org
The defining feature of video compared to still images is motion, and as such the selection of
good motion features for action recognition is crucial, especially for bag of words techniques …
good motion features for action recognition is crucial, especially for bag of words techniques …
Single sign-on identity management between local and remote systems
E Doitch, YV Angelov, SV Yong, YI Rouskov… - US Patent …, 2020 - Google Patents
Single sign-on identity management between local and cloud-based systems is provided. A
remote or cloud-based authentication endpoint is registered as a local device, service or …
remote or cloud-based authentication endpoint is registered as a local device, service or …
A survey on identity and access management for cross-domain dynamic users: issues, solutions, and challenges
A Badirova, S Dabbaghi, FF Moghaddam… - IEEE …, 2023 - ieeexplore.ieee.org
Access control management in a heterogeneous cloud environment, where the number of
users is growing, is a daunting task for service providers. Efficiency is heavily reliant on …
users is growing, is a daunting task for service providers. Efficiency is heavily reliant on …
Consolidated Identity Management System for secure mobile cloud computing
Security issues in cloud computing are shown to be the biggest obstacle that could lower the
wide benefits of the cloud systems. This obstacle may be strengthened when cloud services …
wide benefits of the cloud systems. This obstacle may be strengthened when cloud services …
[BUCH][B] Digital identity management
M Laurent, S Bouzefrane - 2015 - books.google.com
In the past four decades, information technology has altered chains of value production,
distribution, and information access at a significant rate. These changes, although they have …
distribution, and information access at a significant rate. These changes, although they have …
Service delivery models of cloud computing: security issues and open challenges
Cloud computing represents the most recent enterprise trend in information technology and
refers to the virtualization of computing resources that are available on demand. Cloud …
refers to the virtualization of computing resources that are available on demand. Cloud …
A novel predicate based access control scheme for cloud environment using open stack swift storage
Storage in cloud computing is the fundamental service which is widely used by consumers
of cloud. Cloud offer many advantages such as flexibility, elasticity, scalability and sharing of …
of cloud. Cloud offer many advantages such as flexibility, elasticity, scalability and sharing of …
Security, privacy and usability–a survey of users' perceptions and attitudes
Users are now in possession of an ever-growing number of advance digital devices with a
wide range of capabilities which are used for accessing, storing and processing enormous …
wide range of capabilities which are used for accessing, storing and processing enormous …