Sessionjuggler: secure web login from an untrusted terminal using session hijacking

E Bursztein, C Soman, D Boneh… - Proceedings of the 21st …, 2012 - dl.acm.org
We use modern features of web browsers to develop a secure login system from an
untrusted terminal. The system, called Session Juggler, requires no server-side changes …

Business-driven service placement for highly dynamic and distributed cloud systems

M Tortonesi, L Foschini - IEEE Transactions on Cloud …, 2016 - ieeexplore.ieee.org
The emergence of large-scale Cloud computing environments characterized by dynamic
resource pricing schemes enables valuable cost saving opportunities for service providers …

Adaptive and business-driven service placement in federated Cloud computing environments

L Foschini, M Tortonesi - 2013 IFIP/IEEE International …, 2013 - ieeexplore.ieee.org
The emergence of large-scale federated Cloud computing environments and of dynamic
resource pricing schemes presents interesting saving opportunities for service providers …

Design, implementation and analysis of multi layer, multi factor authentication (mfa) setup for webmail access in multi trust networks

S Chaudhari, SS Tomar, A Rawat - … International Conference on …, 2011 - ieeexplore.ieee.org
The obvious advantages of Multi Factor Authentication (MFA)-in terms of enhanced identity
theft protection and account hijacking protection-have resulted in its large scale adoption in …

Unified framework for multifactor authentication

C Pavlovski, C Warwar, B Paskin… - 2015 22nd International …, 2015 - ieeexplore.ieee.org
The progression towards the use of mobile network devices in all facets of personal,
business and leisure activity has created new threats to users and challenges to the industry …

NemoAuth: a mnemonic multimodal approach to mobile user authentication

Z Le, X Zhang, Z Gao - … of IEEE Region 10 (TENCON 2013), 2013 - ieeexplore.ieee.org
User authentication is always the first step of security services/mechanisms in computing
infrastructures. However, mobile devices and clouds bring challenges and also new …

Data center resource management with temporal dynamic workload

H Qian, D Medhi - 2013 IFIP/IEEE International Symposium on …, 2013 - ieeexplore.ieee.org
The proliferation of Internet services drives the data center expansion in both size and the
number. More importantly, the energy consumption (as part of the total cost of ownership …

DReaM-Cache: Distributed Real-Time Transaction Memory Cache to support two-factor authentication services and its reliability

H Qian, CS Surapaneni, M Ray… - 2010 IEEE Network …, 2010 - ieeexplore.ieee.org
PhoneFactor is a two-factor authentication service that combines the knowledge-based
authenticator with an object-based authenticator in which the object-based authenticator has …

[图书][B] Data center resource management with temporal dynamic workload

H Qian - 2012 - search.proquest.com
The proliferation of Internet services drives the data center expansion in both size and the
number. More importantly, the energy consumption (as part of total cost of ownership (TCO)) …

[图书][B] Energy efficient resource allocation for virtual network services with dynamic workload in cloud data centers

X Guan - 2015 - search.proquest.com
Network virtualization and resource sharing have been employed to improve energy
efficiency of data centers by aggregating workload to a few physical nodes and switch the …