Ghazizadeh et al., 2012 - Google Patents
A trust based model for federated identity architecture to mitigate identity theftGhazizadeh et al., 2012
- Document ID
- 16309835696005728336
- Author
- Ghazizadeh E
- Zamani M
- Khaleghparast R
- Taherian A
- et al.
- Publication year
- Publication venue
- 2012 International Conference for Internet Technology and Secured Transactions
External Links
Snippet
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues as well as running the appropriate applications. Another entry on the list of functions which has been handled internally is …
- 238000000034 method 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Indu et al. | Identity and access management in cloud environment: Mechanisms and challenges | |
Ghazizadeh et al. | A survey on security issues of federated identity in the cloud computing | |
Khalil et al. | Consolidated Identity Management System for secure mobile cloud computing | |
Sumitra et al. | A survey of cloud authentication attacks and solution approaches | |
EP2572489B1 (en) | System and method for protecting access to authentication systems | |
Bui et al. | {Man-in-the-Machine}: Exploiting {Ill-Secured} Communication Inside the Computer | |
Ghazizadeh et al. | A trust based model for federated identity architecture to mitigate identity theft | |
Alnahari et al. | Authentication of IoT device and IoT server using security key | |
Malik et al. | Federated identity management (FIM): Challenges and opportunities | |
Ghazizadeh et al. | Trusted computing strengthens cloud authentication | |
Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
Dhondge | Lifecycle IoT Security for Engineers | |
Rastogi et al. | Secured identity management system for preserving data privacy and transmission in cloud computing | |
Karthiga et al. | Enhancing performance of user authentication protocol with resist to password reuse attacks | |
Binu et al. | A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services | |
Eldow et al. | Literature review of authentication layer for public cloud computing: a meta-analysis | |
Chhabra et al. | Cloud computing: towards risk assessment | |
Ghazizadeh et al. | Secure openID authentication model by using trusted computing | |
Dietz et al. | Hardening Persona-Improving Federated Web Login. | |
Algaradi et al. | Big data security: a progress study of current user authentication schemes | |
Bang et al. | On Threat Models for Information-Stealing Malware (ISM) Targeting Password Managers | |
Yasin et al. | Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT). | |
Kuzminykh et al. | Mechanisms of ensuring security in Keystone service | |
Shukla et al. | A Passwordless MFA Utlizing Biometrics, Proximity and Contactless Communication | |
Yang et al. | Context-Aware Phishing-Resistant Authentication for Federated Identity in Internet of Things Platforms |