2017
DOI: 10.1007/978-981-10-3920-1_20
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Framework for Cloud Machine Deletion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…The first step in cloud forensics to assure high levels of security is user authentication. 24 Here, preventing evidence from unauthorized users is the main goal. Email verification and one-time passwords (OTP) are used for effective authentication.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The first step in cloud forensics to assure high levels of security is user authentication. 24 Here, preventing evidence from unauthorized users is the main goal. Email verification and one-time passwords (OTP) are used for effective authentication.…”
Section: Related Workmentioning
confidence: 99%
“…The first step in cloud forensics to assure high levels of security is user authentication 24 . Here, preventing evidence from unauthorized users is the main goal.…”
Section: Related Workmentioning
confidence: 99%
“…User authentication is the foremost process of cloud forensic to ensure high-level security [23]. Here the significant aim is to prevent evidence from unauthorized users.…”
Section: B Motivationmentioning
confidence: 99%