Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
More and more companies begin to provide different kinds of cloud computing services for
Internet users at the same time these services also bring some security problems. Currently …
Internet users at the same time these services also bring some security problems. Currently …
An identity-based security infrastructure for cloud environments
C Schridde, T Dörnemann, E Juhnke… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
This paper presents a novel security infrastructure for deploying and using service-oriented
Cloud applications securely without having to face the complexity associated with certificate …
Cloud applications securely without having to face the complexity associated with certificate …
CRFs for digital signature and NIZK proof system in web services
B Kang, L Zhang, Y Yang, X Meng - International Conference on …, 2022 - Springer
Web services are service-oriented computing technology which allows computers running
different operating domains to access and share each other's databases. Each web service …
different operating domains to access and share each other's databases. Each web service …
Modified identify and broadcast-based encryption scheme to secure cloud
Cloud computing is foreseen as the lineage framework model for Distributed Computing
Environment and has escalated itself in due course of time owing to the advantages it …
Environment and has escalated itself in due course of time owing to the advantages it …
MSRCC–mitigation of security risks in cloud computing
D Chandramohan, T Vengattaraman… - Advances in Computing …, 2012 - Springer
Cloud computing represents the latest phase in the evolution of Internet-based computing. In
spite of the attractive properties it provides, security and privacy issues loom large for cloud …
spite of the attractive properties it provides, security and privacy issues loom large for cloud …
Cross-platform identity-based cryptography using WebAssembly
Á Vécsi, A Bagossy, A Pethő - Infocommunications journal, 2019 - real.mtak.hu
The explosive spread of the devices connected to the Internet has increased the need for
efficient and portable cryptographic routines. Despite this fact, truly platformindependent …
efficient and portable cryptographic routines. Despite this fact, truly platformindependent …
Identity management in hybrid cloud
Cloud Computing is a platform that relies on sharing resources, software and information
between remote servers and users over the network. Since cloud computing share …
between remote servers and users over the network. Since cloud computing share …
Authentication and billing framework for service oriented architecture
The current business environment has become still more demanding in which organizations
are under increasing pressure not only to increase revenue but also to respond quickly to …
are under increasing pressure not only to increase revenue but also to respond quickly to …
Name transformation for a public key infrastructure (PKI)
JC Wray, DJ Miller - US Patent 7,647,494, 2010 - Google Patents
In general, the present invention provides a method, system and program product for
transforming a name for a PKI. Specifically, the present invention transforms a name of a …
transforming a name for a PKI. Specifically, the present invention transforms a name of a …
A policy based access control model for web services
HS Alipour, M Sabbari, E Nazemi - … International Conference for …, 2011 - ieeexplore.ieee.org
Access control security is one of the important aspects in Service Oriented Architecture
(SOA) that is considered as a challenge. This issue requires further attention and review …
(SOA) that is considered as a challenge. This issue requires further attention and review …