[go: up one dir, main page]

Ghazizadeh et al., 2012 - Google Patents

A trust based model for federated identity architecture to mitigate identity theft

Ghazizadeh et al., 2012

Document ID
16309835696005728336
Author
Ghazizadeh E
Zamani M
Khaleghparast R
Taherian A
et al.
Publication year
Publication venue
2012 International Conference for Internet Technology and Secured Transactions

External Links

Snippet

Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues as well as running the appropriate applications. Another entry on the list of functions which has been handled internally is …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Similar Documents

Publication Publication Date Title
Indu et al. Identity and access management in cloud environment: Mechanisms and challenges
Ghazizadeh et al. A survey on security issues of federated identity in the cloud computing
Khalil et al. Consolidated Identity Management System for secure mobile cloud computing
Sumitra et al. A survey of cloud authentication attacks and solution approaches
EP2572489B1 (en) System and method for protecting access to authentication systems
Bui et al. {Man-in-the-Machine}: Exploiting {Ill-Secured} Communication Inside the Computer
Ghazizadeh et al. A trust based model for federated identity architecture to mitigate identity theft
Alnahari et al. Authentication of IoT device and IoT server using security key
Malik et al. Federated identity management (FIM): Challenges and opportunities
Ghazizadeh et al. Trusted computing strengthens cloud authentication
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Dhondge Lifecycle IoT Security for Engineers
Rastogi et al. Secured identity management system for preserving data privacy and transmission in cloud computing
Karthiga et al. Enhancing performance of user authentication protocol with resist to password reuse attacks
Binu et al. A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services
Eldow et al. Literature review of authentication layer for public cloud computing: a meta-analysis
Chhabra et al. Cloud computing: towards risk assessment
Ghazizadeh et al. Secure openID authentication model by using trusted computing
Dietz et al. Hardening Persona-Improving Federated Web Login.
Algaradi et al. Big data security: a progress study of current user authentication schemes
Bang et al. On Threat Models for Information-Stealing Malware (ISM) Targeting Password Managers
Yasin et al. Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT).
Kuzminykh et al. Mechanisms of ensuring security in Keystone service
Shukla et al. A Passwordless MFA Utlizing Biometrics, Proximity and Contactless Communication
Yang et al. Context-Aware Phishing-Resistant Authentication for Federated Identity in Internet of Things Platforms