2016
DOI: 10.14257/ijgdc.2016.9.9.18
|View full text |Cite
|
Sign up to set email alerts
|

Multilevel Authentication Scheme for Cloud Computing

Abstract: consists of three level of authentication, and the data will be splitting on this level depending on the sensitivity to confidential (C), secret (S), and top secret (TS). Data at level (C) have the lowest sensitivity. The user at this level has single textual password to access this level data. The user at level (S) has two passwords, textual and biometrics password to access this level and the lower level. User at level (TS) has three password textual, biometrics password and image sequencing password. The da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…There is a common problem in group dispatch, that is, the processor will always be idle when the queue is waiting for the queue [5] . In order to avoid this time fragmentation, the implementation of transfer is necessary.…”
Section: Architecture Introductionmentioning
confidence: 99%
“…There is a common problem in group dispatch, that is, the processor will always be idle when the queue is waiting for the queue [5] . In order to avoid this time fragmentation, the implementation of transfer is necessary.…”
Section: Architecture Introductionmentioning
confidence: 99%