2011
DOI: 10.1007/978-3-642-23312-8_16
|View full text |Cite
|
Sign up to set email alerts
|

User Authentication Platform Using Provisioning in Cloud Computing Environment

Abstract: Abstract. Cloud computing is a computing environment centered on users and can use programs or documents stored respectivily in servers by operating an applied software such as Web browser through diverse devices on where users can access Internet as an on-demand outsourcing service of IT resources using Internet. In order to use these cloud computing service, a user authentication is needed. This paper proposed the platform for user authentication using provisioning in Cloud computing environment.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…The scheme includes methods that interpret and infer the high level context and resources management technique that manages distributed IT resources effectively. Further to that, H. Ahn et al extended the context aware cloud authentication to include access control [21] [22]. The authors proposed a context-aware RBAC model which provides efficient access control to user through active classification, inference and judgment of the users assessing systems and resources.…”
Section: Context-aware Cloud Authenticationmentioning
confidence: 99%
“…The scheme includes methods that interpret and infer the high level context and resources management technique that manages distributed IT resources effectively. Further to that, H. Ahn et al extended the context aware cloud authentication to include access control [21] [22]. The authors proposed a context-aware RBAC model which provides efficient access control to user through active classification, inference and judgment of the users assessing systems and resources.…”
Section: Context-aware Cloud Authenticationmentioning
confidence: 99%
“…The author has performed the authentication over mobile devices showing the importance of authentication over it. Studies towards authentication in cloud have been witnessed in the work of Ahn et al [38], Kim and Moon [39], and Ghazizadeh et al [40]. All these implementations are quite unique in their methods and the paper has presented strong background to prove its efficiency towards authentication mechanism.…”
Section: Authenticationmentioning
confidence: 99%
“…al [13] Applied technique for Access control and user authentication are security technologies used for platforms. Access control is the technology that controls a process in the operating system not to approach the area of another process.…”
Section: Related Workmentioning
confidence: 99%