2016 10th International Conference on Intelligent Systems and Control (ISCO) 2016
DOI: 10.1109/isco.2016.7727141
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid multilevel authentication scheme for private cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(15 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…The underlying computing resources are isolated before being delivered through secure private networks rather than being shared with fellow customers. A private cloud can be customized to meet the various security and business needs of an organization at large [21]. With greater control and visibility into such infrastructure, companies can operate IT workloads that are compliance sensitive without necessarily having implications on performance and security.…”
Section: B Cloud Computingmentioning
confidence: 99%
“…The underlying computing resources are isolated before being delivered through secure private networks rather than being shared with fellow customers. A private cloud can be customized to meet the various security and business needs of an organization at large [21]. With greater control and visibility into such infrastructure, companies can operate IT workloads that are compliance sensitive without necessarily having implications on performance and security.…”
Section: B Cloud Computingmentioning
confidence: 99%
“…The underlying computing resources are isolated before being delivered through secure private networks rather than being shared with fellow customers. Private cloud can be customized to meet the various security and business needs of an organization at large (Sridhar and Smys, 2016). With greater control and visibility into such infrastructure, companies can operate IT workloads that are compliance sensitive without necessarily having implications on performance and security.…”
Section: Cloud Computingmentioning
confidence: 99%
“…A channel is the guide of correspondence between the inquirer and the screen. It can be considered as private, true blue, either secure or as dubious [7]. A mystery channel is impenetrable to an IS may require different degrees of approval, for example, a level for the directors and a level for the customers.…”
Section: The Authentication Conceptmentioning
confidence: 99%