2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC) 2013
DOI: 10.1109/pccc.2013.6742763
|View full text |Cite
|
Sign up to set email alerts
|

Secure user authentication in cloud computing management interfaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…Forensic response can also be an issue for the tenants similarly to legal related issues. Another source of issue in cloud computing is the usage of mobile devices much like other computing devices [10], [11], [66]. Device loss and the possibility for an adversary to access resources illegitimately is deemed to be a major concern.…”
Section: A Security Challenges In Cloud Computing For Healthcarementioning
confidence: 99%
See 1 more Smart Citation
“…Forensic response can also be an issue for the tenants similarly to legal related issues. Another source of issue in cloud computing is the usage of mobile devices much like other computing devices [10], [11], [66]. Device loss and the possibility for an adversary to access resources illegitimately is deemed to be a major concern.…”
Section: A Security Challenges In Cloud Computing For Healthcarementioning
confidence: 99%
“…According to Cloud Security Alliance (CSA) [11], the security guidance for key areas in cloud computing include data lose or leakage, account or service hijacking, insecure interface, denial of service [12] and malicious insider. Other areas of cloud computing which require attention are data breaches, abuse of cloud services [13], [14], insufficient due diligence and insecure VM migration [14], [15].…”
Section: A Security Challenges In Cloud Computing For Healthcarementioning
confidence: 99%
“…In [10], Soares, et. al. state that the emergence of mobile computing also makes authentication a priority, and has been reinforcing the need to build stronger and more resilient mechanisms; and simultaneously providing the means to develop new authentication mechanisms, namely Multi-Factor Authentication (MFA) schemes.…”
Section: Related Workmentioning
confidence: 99%
“…C Threat is harm or unauthorized access that might occur due to vulnerability and destroy organization assets, organization operations or system information C Vulnerability is any weakness in information system, system security procedures, internal controls or implementation that could be exploited or triggered by a threat resources (Bertino et al, 2010) Cloud computing threats: Cloud Security Alliance (CSA) (Soares et al, 2013) as a security assurance provider released the security guidance for critical areas in cloud computing for managing risks and understanding security threats. The most of significant threats that are related to on-demand nature of cloud computing are categorized as below:…”
Section: Security Issues Of Cloud Computingmentioning
confidence: 99%