Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
More and more companies begin to provide different kinds of cloud computing services for
Internet users at the same time these services also bring some security problems. Currently …
Internet users at the same time these services also bring some security problems. Currently …
An identity-based security infrastructure for cloud environments
C Schridde, T Dörnemann, E Juhnke… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
This paper presents a novel security infrastructure for deploying and using service-oriented
Cloud applications securely without having to face the complexity associated with certificate …
Cloud applications securely without having to face the complexity associated with certificate …
CRFs for digital signature and NIZK proof system in web services
B Kang, L Zhang, Y Yang, X Meng - International Conference on …, 2022 - Springer
Web services are service-oriented computing technology which allows computers running
different operating domains to access and share each other's databases. Each web service …
different operating domains to access and share each other's databases. Each web service …
Modified identify and broadcast-based encryption scheme to secure cloud
Cloud computing is foreseen as the lineage framework model for Distributed Computing
Environment and has escalated itself in due course of time owing to the advantages it …
Environment and has escalated itself in due course of time owing to the advantages it …
MSRCC–mitigation of security risks in cloud computing
D Chandramohan, T Vengattaraman… - Advances in Computing …, 2012 - Springer
Cloud computing represents the latest phase in the evolution of Internet-based computing. In
spite of the attractive properties it provides, security and privacy issues loom large for cloud …
spite of the attractive properties it provides, security and privacy issues loom large for cloud …
[PDF][PDF] Cross-platform identity-based cryptography using WebAssembly
Á Vécsi, A Bagossy, A Pethő - Infocommunications journal, 2019 - infocommunications.hu
Identity-based cryptography (IBC) is an important branch of public-key cryptography.
Although its foundations were established in 1985 by Shamir [1], who managed to build an …
Although its foundations were established in 1985 by Shamir [1], who managed to build an …
Improving attribute based access control model for web services
M Sabbari, HS Alipour - 2011 World Congress on Information …, 2011 - ieeexplore.ieee.org
Distributed systems such as SOA are typically heterogeneous systems that are opened to a
wide variety of partners, customers, clients and resources, which introduce a new security …
wide variety of partners, customers, clients and resources, which introduce a new security …
Identity management in hybrid cloud
Cloud Computing is a platform that relies on sharing resources, software and information
between remote servers and users over the network. Since cloud computing share …
between remote servers and users over the network. Since cloud computing share …
Name transformation for a public key infrastructure (PKI)
JC Wray, DJ Miller - US Patent 7,647,494, 2010 - Google Patents
In general, the present invention provides a method, system and program product for
transforming a name for a PKI. Specifically, the present invention transforms a name of a …
transforming a name for a PKI. Specifically, the present invention transforms a name of a …
Authentication and billing framework for service oriented architecture
The current business environment has become still more demanding in which organizations
are under increasing pressure not only to increase revenue but also to respond quickly to …
are under increasing pressure not only to increase revenue but also to respond quickly to …