Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography

L Yan, C Rong, G Zhao - IEEE international conference on cloud …, 2009 - Springer
More and more companies begin to provide different kinds of cloud computing services for
Internet users at the same time these services also bring some security problems. Currently …

An identity-based security infrastructure for cloud environments

C Schridde, T Dörnemann, E Juhnke… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
This paper presents a novel security infrastructure for deploying and using service-oriented
Cloud applications securely without having to face the complexity associated with certificate …

CRFs for digital signature and NIZK proof system in web services

B Kang, L Zhang, Y Yang, X Meng - International Conference on …, 2022 - Springer
Web services are service-oriented computing technology which allows computers running
different operating domains to access and share each other's databases. Each web service …

Modified identify and broadcast-based encryption scheme to secure cloud

UR Saxena, T Alam - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Cloud computing is foreseen as the lineage framework model for Distributed Computing
Environment and has escalated itself in due course of time owing to the advantages it …

MSRCC–mitigation of security risks in cloud computing

D Chandramohan, T Vengattaraman… - Advances in Computing …, 2012 - Springer
Cloud computing represents the latest phase in the evolution of Internet-based computing. In
spite of the attractive properties it provides, security and privacy issues loom large for cloud …

[PDF][PDF] Cross-platform identity-based cryptography using WebAssembly

Á Vécsi, A Bagossy, A Pethő - Infocommunications journal, 2019 - infocommunications.hu
Identity-based cryptography (IBC) is an important branch of public-key cryptography.
Although its foundations were established in 1985 by Shamir [1], who managed to build an …

Improving attribute based access control model for web services

M Sabbari, HS Alipour - 2011 World Congress on Information …, 2011 - ieeexplore.ieee.org
Distributed systems such as SOA are typically heterogeneous systems that are opened to a
wide variety of partners, customers, clients and resources, which introduce a new security …

Identity management in hybrid cloud

A Goel, G Gupta, M Bhushan… - … Conference on Green …, 2015 - ieeexplore.ieee.org
Cloud Computing is a platform that relies on sharing resources, software and information
between remote servers and users over the network. Since cloud computing share …

Name transformation for a public key infrastructure (PKI)

JC Wray, DJ Miller - US Patent 7,647,494, 2010 - Google Patents
In general, the present invention provides a method, system and program product for
transforming a name for a PKI. Specifically, the present invention transforms a name of a …

Authentication and billing framework for service oriented architecture

T Pandey, B Singh, DS Kushwaha… - … Conference on Systems, 2009 - ieeexplore.ieee.org
The current business environment has become still more demanding in which organizations
are under increasing pressure not only to increase revenue but also to respond quickly to …