2011
DOI: 10.1007/978-3-642-20998-7_42
|View full text |Cite
|
Sign up to set email alerts
|

User Authentication in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…The recent progress in access control mechanisms is Risk-Adaptive-Access-Control, where the decision for access relies on dynamic assessment. There is a lot of knowledge on this subject in the existing research literature [34][35]. Moreover, risk-oriented access control solutions and authentication processes are considered in the access management policies.…”
Section: ) Risk-based Access Control and Authenticationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The recent progress in access control mechanisms is Risk-Adaptive-Access-Control, where the decision for access relies on dynamic assessment. There is a lot of knowledge on this subject in the existing research literature [34][35]. Moreover, risk-oriented access control solutions and authentication processes are considered in the access management policies.…”
Section: ) Risk-based Access Control and Authenticationsmentioning
confidence: 99%
“…This technique can protect users from stopping mechanical keystroke captures but renders them helpless against any concerning phishing attacks. The authors in the study of Chang and Choi [38] discussed access control and user authentication and tried to explore a significant problem and research challenges associated with it. The authors have studied the research gap and many directions for future research work.…”
Section: ) Risk-based Access Control and Authenticationsmentioning
confidence: 99%
“…In every CSP having their possess verification method for clients to access the cloud utility. For Example, Google Apps, Sales force and Microsoft Office 365 are using their own authentication mechanism [53]. Refusal with security policy.…”
Section: Validation Managingmentioning
confidence: 99%
“…Hyokyung et al [12]. discussed various technologies of access control and user authentication problems inside.…”
Section: Related Workmentioning
confidence: 99%