Authentication in mobile cloud computing: A survey
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …
that incorporates multitude of heterogeneous cloud-based resources to augment …
On security in publish/subscribe services: A survey
C Esposito, M Ciampi - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Publish/subscribe services have encountered considerable success in the building of
modern large-scale mission-critical systems. Such systems are characterized by several non …
modern large-scale mission-critical systems. Such systems are characterized by several non …
Distributed secure content delivery
EC Layton, LT Hallett, TD Maynard… - US Patent …, 2014 - Google Patents
Techniques for distributed and secure content delivery are provided. Requests for content
are routed to a centralized service where the requestors are authenticated for access to the …
are routed to a centralized service where the requestors are authenticated for access to the …
[图书][B] Managing information systems security and privacy
D Trcek - 2006 - books.google.com
The book deals with the management of information systems security and privacy, based on
a model that covers technological, organizational and legal views. This is the basis for a …
a model that covers technological, organizational and legal views. This is the basis for a …
Identification and authentication: technology and implementation issues
M Zviran, Z Erlich - … of the Association for Information Systems, 2006 - aisel.aisnet.org
Computer-based information systems in general, and Internet e-commerce and e-business
systems in particular, employ many types of resources that need to be protected against …
systems in particular, employ many types of resources that need to be protected against …
Securing distributed systems using patterns: A survey
AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2012 - Elsevier
Driven by expanding scientific computing and business enterprise needs, the last decade
has seen a shift toward software paradigms in which distribution plays a central role. The …
has seen a shift toward software paradigms in which distribution plays a central role. The …
Supporting attribute-based access control in authentication and authorization infrastructures with ontologies
T Priebe, W Dobmeier, C Schläger… - Journal of software …, 2007 - epub.uni-regensburg.de
In highly open systems like the Internet, attributebased access control (ABAC) has proven its
appropriateness. This is reflected in the utilization of ABAC in authentication and …
appropriateness. This is reflected in the utilization of ABAC in authentication and …
An MCDA cause-effect factors model for the implementation of Greenstone Digital Library software
Purpose The selection of effective library software not only plays an important role for
students, academic staff and the library staff but also helps an institution by having the library …
students, academic staff and the library staff but also helps an institution by having the library …
Users' willingness to pay for web identity management systems
Electronic services such as virtual communities or electronic commerce demand user
authentication. Several more or less successful federated identity management systems …
authentication. Several more or less successful federated identity management systems …
Trust, privacy and security in e-business: Requirements and solutions
An important aspect of e-business is the area of e-commerce. One of the most severe
restraining factors for the proliferation of e-commerce, is the lack of trust between customers …
restraining factors for the proliferation of e-commerce, is the lack of trust between customers …