Encrypted token based authentication with adapted SAML technology for cloud web services

I Indu, RA PM, V Bhaskar - Journal of Network and Computer Applications, 2017 - Elsevier
Web applications and cloud services are rapidly emerging as the inevitable technology for
communication between organizations. Cloud-based solutions are currently deployed to …

A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services

S Binu, M Misbahuddin, P Raj - Computer and Network Security …, 2018 - Springer
Cloud computing is an emerging computing paradigm that offers computational facilities and
storage as services dynamically on demand basis via the Internet. The ability to scale …

[PDF][PDF] Comparative study on authentication schemes for cloud computing

S Choksi - International Journal of Engineering Development and …, 2014 - Citeseer
Cloud computing has changed the corporate as well as educational industry ever since it
evolved. Cloud computing is basically convenient, cost effective and on demand service …

A Secure Two‐Factor Authentication Framework in Cloud Computing

S Kaur, G Kaur, M Shabaz - Security and Communication …, 2022 - Wiley Online Library
Cloud computing technology has brought tremendous evaluation in the arena of IT
(information technology). This technology paves the path of starting business with lowest …

Security service level agreements based authentication and authorization model for accessing cloud services

D Bajpai, M Vardhan, S Gupta, R Kumar… - Advances in Computing …, 2012 - Springer
Cloud computing is defined as delivering of computing resources as a service. Discovery of
reliable resource provider and access control are key components of cloud computing …

[PDF][PDF] A lightweight authentication scheme for mobile cloud computing

MR Momeni - International Journal of Computer Science and …, 2014 - academia.edu
The ABI Research believes that the number of mobile cloud computing users is expected to
grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total …

[PDF][PDF] Implementation of EAP with RSA for enhancing the security of cloud computing

S Marium, Q Nazir, A Ahmed, S Ahthasham… - International Journal of …, 2012 - academia.edu
Cloud Computing is emerging approach because of high availability, efficient cost and
performance. In Cloud Computing, services providers will provide the storage for data along …

[PDF][PDF] Accessing Cloud Services Using Token based Framework for IoT Devices.

NS Yadav, M Rao, DV Parameswari, KLS Soujanya… - Webology, 2021 - webology.org
Nowadays cloud environments are used by many business service sectors like healthcare,
retail marketing, banking, and many business fields. At the same time, the usage of Internet …

Authentication issues and techniques in cloud computing security: A review

A Sharma, B Keshwani, P Dadheech - Proceedings of International …, 2019 - papers.ssrn.com
Cloud Computing is a service which is rapidly increasing its growth in IT industry in recent
years. The privacy and security is main challenging issue for the cloud users as well …

A brief review on cloud computing authentication frameworks

AR Khan, LK Alnwihel - Engineering, Technology & Applied Science …, 2023 - etasr.com
Cloud computing is among the most widely used technologies worldwide as it helps
individual users and organizations to store and share information conveniently and cost …