Tumbe Group of International Journals

References


  1. CSA, Security Guidance Critical Areas of Focus for Critical Areas of Focus inCloud Computing V2.1, Cloud Security Alliance, No. 1, pp. 1–76, 2009. [Online]https://cloudsecurityalliance.org/csaguide.pdf
  2. S. Eludiora, A user identity management protocol for cloud computingparadigm, Int. J. Commun. Netw. Syst. Sci. 4 (2011) 152–163,https://doi.org/10.4236/ijcns.2011.43019.
  3. S. Subashini, V. Kavitha, A survey on security issues in service delivery modelsof cloud computing, J. Netw. Comput. Appl. 34 (2011) 1–11,https://doi.org/10.1016/j.jnca.2010.07.006.
  4. Wayne Jansen and Timothy Grance, Guidelines on Security and Privacy inPublic Cloud Computing, NIST Special Publication, pp. 800-144, 2011. [Online]http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf
  5. S. Singh, Y.S. Jeong, J.H. Park, A survey on cloud computing security: issues,threats, and solutions, J. Netw. Comput. Appl. 75 (2016) 200–222,https://doi.org/10.1016/j.jnca.2016.09.002.
  6. A. Castiglione, A. De Santis, B. Masucci, F. Palmieri, A. Castiglione, J. Li, X.Huang, Hierarchical and shared access control, IEEE Trans. Inf. Forensics Secur.11 (2016) 850–865,https://doi.org/10.1109/TIFS.2015.2512533.
  7. M. Alizadeh, S. Abolfazli, M. Zamani, S. Baharun, K. Sakurai, Authentication inmobile cloud computing: a survey, J. Netw. Comput. Appl. 61 (2016) 59–80,https://doi.org/10.1016/j.jnca.2015.10.005.
  8. Z. Liu, J. Luo, L. Xu, A fine-grained attribute-based authentication for sensitivedata stored in cloud computing, Int. J. Grid Util. Comput. 7 (2016) 237–244,https://doi.org/10.1504/IJGUC.2016.10001940.
  9. D.H. Sharma, C.A. Dhote, M.M. Potey, Identity and access management assecurity-as-a-service from clouds, Procedia Comput. Sci. 79 (2016) 170–174,https://doi.org/10.1016/j.procs.2016.03.117.
  10. A. Singh, K. Chatterjee, Identity Management in Cloud Computing throughClaim-Based Solution, in: 2015 Fifth Int. Conf. Adv. Comput. Commun.Technol., IEEE, 2015. doi:10.1109/acct.2015.89.
  11. I. Butun, M. Erol-Kantarci, B. Kantarci, H. Song, Cloud-centric multi-level authentication as a service for secure public safety device networks, IEEE Commun. Mag. 54(2016)47 53,https://doi.org/10.1109/mcom.2016.7452265.


Sign In  /  Register

Most Downloaded Articles

Acquire employability in Indian Sinario

The Pink Sonnet

Department of Mathematics @ GFGC Tumkur

ಸರ್ಕಾರಿ ದೇಗುಲ

Knowledge and Education- At Conjecture




© 2018. Tumbe International Journals . All Rights Reserved. Website Designed by ubiJournal