Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography

L Yan, C Rong, G Zhao - … , CloudCom 2009, Bei**g, China, December 1-4 …, 2009 - Springer
More and more companies begin to provide different kinds of cloud computing services for
Internet users at the same time these services also bring some security problems. Currently …

An identity-based security infrastructure for cloud environments

C Schridde, T Dörnemann, E Juhnke… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
This paper presents a novel security infrastructure for deploying and using service-oriented
Cloud applications securely without having to face the complexity associated with certificate …

CRFs for digital signature and NIZK proof system in web services

B Kang, L Zhang, Y Yang, X Meng - International Conference on …, 2022 - Springer
Web services are service-oriented computing technology which allows computers running
different operating domains to access and share each other's databases. Each web service …

Modified identify and broadcast-based encryption scheme to secure cloud

UR Saxena, T Alam - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Cloud computing is foreseen as the lineage framework model for Distributed Computing
Environment and has escalated itself in due course of time owing to the advantages it …

MSRCC–mitigation of security risks in cloud computing

D Chandramohan, T Vengattaraman… - Advances in Computing …, 2012 - Springer
Cloud computing represents the latest phase in the evolution of Internet-based computing. In
spite of the attractive properties it provides, security and privacy issues loom large for cloud …

Cross-platform identity-based cryptography using WebAssembly

Á Vécsi, A Bagossy, A Pethő - Infocommunications journal, 2019 - real.mtak.hu
The explosive spread of the devices connected to the Internet has increased the need for
efficient and portable cryptographic routines. Despite this fact, truly platformindependent …

Identity management in hybrid cloud

A Goel, G Gupta, M Bhushan… - … Conference on Green …, 2015 - ieeexplore.ieee.org
Cloud Computing is a platform that relies on sharing resources, software and information
between remote servers and users over the network. Since cloud computing share …

Authentication and billing framework for service oriented architecture

T Pandey, B Singh, DS Kushwaha… - … Conference on Systems, 2009 - ieeexplore.ieee.org
The current business environment has become still more demanding in which organizations
are under increasing pressure not only to increase revenue but also to respond quickly to …

Name transformation for a public key infrastructure (PKI)

JC Wray, DJ Miller - US Patent 7,647,494, 2010 - Google Patents
In general, the present invention provides a method, system and program product for
transforming a name for a PKI. Specifically, the present invention transforms a name of a …

A policy based access control model for web services

HS Alipour, M Sabbari, E Nazemi - … International Conference for …, 2011 - ieeexplore.ieee.org
Access control security is one of the important aspects in Service Oriented Architecture
(SOA) that is considered as a challenge. This issue requires further attention and review …