International Journal of Communications, Network and System Sciences

International Journal of Communications, Network and System Sciences

ISSN Print: 1913-3715
ISSN Online: 1913-3723
www.scirp.org/journal/ijcns
E-mail: ijcns@scirp.org
"A User Identity Management Protocol for Cloud Computing Paradigm"
written by Safiriyu Eludiora, Olatunde Abiona, Ayodeji Oluwatope, Adeniran Oluwaranti, Clement Onime, Lawrence Kehinde,
published by International Journal of Communications, Network and System Sciences, Vol.4 No.3, 2011
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Sharing PHR Data in Cloud Using Sigmoid Key and Median Support Signature-Based Cryptosystem
Wireless Personal Communications, 2022
[2] Privacy Preserving Security Integrating Method with Varying Key Encryption Model in Cloud
2022 International Conference on …, 2022
[3] Uma proposta de análise do ciclo de vida de credenciais em redes LoraWan privadas para IIoT
Anais da XIX Escola Regional de Redes de …, 2021
[4] Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
Electronics, 2021
[5] Microsoft Azure active directory for next level authentication to provide a seamless single sign-on experience
Applied Nanoscience, 2021
[6] A Zero-Trust Federated Identity and Access Management Framework for Cloud and Cloud-based Computing Environments
2020
[7] Cloud MA-MOrBAC: A Cloud Distributed Access Control Model Based on Mobile Agents
2020
[8] Multi-tier Authentication for Cloud Security
2020
[9] Distributed Denial of Service Attacks in Cloud Computing
(IJACSA) International Journal of Advanced Computer Science and Applications, 2020
[10] Cloud MA-MOrBAC: A Cloud Distributed Access Control Model Based on Mobile Agents.
Int. J. Web Appl., 2020
[11] Ensuring Data Security in Cloud Computing using Homomorphic Encryption
2020
[12] Security and Privacy Analyzed Cloud Framework Design and Implementation for Ethiopian Universities
2019
[13] CONCEPTUAL ORIENTED ANALYSIS ON THE IMPACT ON THE CLOUD SECURITY ON THE CYBER ATTACKS
Journal of Analysis and Computation (JAC), 2019
[14] A 3-LEVEL MULTIFACTOR AUTHENTICATION SCHEME FOR CLOUD COMPUTING
2019
[15] Continuous Identity Verification in Cloud Computing Services
2018
[16] Research on the system of smart city park based on cloud computing
Cluster Computing, 2018
[17] Identity and access management in cloud environment: Mechanisms and challenges
Engineering Science and Technology, an International Journal, 2018
[18] FURNISHING CERTAINTY TO SKIPCLOUD BY DEPLOYING VISUAL CRYPTOGRAPHY TACTICS
International Journal of Computer Engineering and Applications, 2018
[19] SOME APPROACHES FOR AUTHENTICATION IN CLOUD COMPUTING
2018
[20] USE OF ACCESS CONTROL LIST ON NETWORK BANDWIDTH MANA GEMENT IN HIGHER PUBLIC EDUCATION INSTITUTIONS IN ETHIO PIA: THE CASE OF …
2018
[21] Improving privacy and trust in federated identity using SAML with hash based encryption algorithm
2017
[22] Collaboration technologies for secure road traffic congestion control system in Egypt
2017
[23] IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
International Journal On Cloud Computing: Services And Architecture, 2017
[24] A Systematic Literature Review of the Data Replication Techniques in the Cloud Environments
Big Data Research, 2017
[25] Evaluation of Secure Cloud Transmission Protocol
International Journal of Computer Network and Information Security, 2017
[26] Role of Agents to Enhance the Security and Scalability in Cloud Environment
2017
[27] Cloud Computing: Governance, Risk Management and Audit of IT Services
2017
[28] Multi-Objective Task Scheduling in Cloud Computing Using an Imperialist Competitive Algorithm
International Journal of Advanced Computer Science and Applications, 2016
[29] College of Natural Sciences
Thesis, 2016
[30] Security Threats in Cloud & P2P Computing
International Journal of Computer Science and Information Security, 2016
[31] A comprehensive review of the data replication techniques in the cloud environments
Journal of Network and Computer Applications, 2016
[32] Cryptographic Protocols for Secure Cloud Computing
International Journal of Security and Its Applications, 2016
[33] Investigating the Barriers of Application of Cloud Computing in the Smart Schools of Iran
International Journal of Advanced Networking and Applications, 2016
[34] Cloud Data Security Framework for Payment Card System: the case of Ethiopia
Thesis, 2016
[35] Enterprise Cloud Adoption: A Quantitative Exploratory Research
Handbook of Research on Architectural Trends in Service-Driven Computing, 2016
[36] A Secure Interactive Architecture for Vehicular Cloud Environment
2016
[37] A comprehensive review of the data replication techniques in the cloud environments: Major trends and future directions
Journal of Network and Computer Applications, 2016
[38] Cryptographic Protocols for Secure Cloud Computing.
2016
[39] A cloud security framework based on trust model and mobile agent
Cloud Technologies and Applications (CloudTech), 2015 International Conference on, 2015
[40] Online Monitoring And Counting Of Voting Using Zigbee Protocol And Cloud Computing.
International Journal of Applied Engineering Research, 2015
[41] Analysis of Security and Privacy in Public Cloud Environment
Cloud Computing (ICCC), 2015 International Conference on, 2015
[42] Multi-Level authentication in Cloud Computing using 3D security
2015
[43] Identity Management in Cloud Computing: Issues, Incidents and Solutions
2015
[44] Digital Identity Management
2015
[45] Preserving Data in Cloud Computing
2015
[46] A phenomenological study on interplay between IT governance and Cloud implementation in enterprises
ProQuest Dissertations Publishing, 2015
[47] Digital Identity in Cloud Computing
Digital Identity Management, 2015
[48] Rainfall Prediction Using Artificial Neural Network.
International Journal of Applied Engineering Research, 2014
[49] Digital Identity Management in Cloud
2014
[50] Optimized Privacy Preservation for Identity Management with Multi Agent Structures in Cloud Computing
2014
[51] Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey
Journal of Network and Computer …, 2014
[52] SURVEY ON SECURED DATA STORAGE USING IDENTITY MANAGEMENT FOR MOBILE CLOUD COMPUTING ENVIRONMENT
PS Kadam, MV Bramhe - ijcitb.com, 2014
[53] Enhancing Security in Cloud Computing Using Multilevel Authentication
Y Patel, N Sethi - ijeecse.com, 2014
[54] Agent Based Information Retrieval in a Cloud: A Theoretical Framework for an Institutional Repository
MN Mahdi, AR Ahmad, R Ismail - ijetae.com, 2014
[55] A User Identity Management Protocol Using Efficient Dynamic Credentials
SS Dharwadkar, RM Jogdand - ijser.in, 2014
[56] Cloud computing: Security model comprising governance, risk management and compliance
Data Mining and Intelligent Computing (ICDMIC), 2014 International Conference on, 2014
[57] The effects of gender, age, and education on cloud computing adoption: A correlational study
2014
[58] Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing
International Journal of computational Engineering research (IJCER), 2013
[59] The major security challenges to cloud computing.
2013
[60] Multi-dimensional Password Generation Technique for accessing cloud services
arXiv preprint arXiv:1207.3636, 2012
[61] A gateway-based access control scheme for collaborative clouds
ICIMP 2012 : The Seventh International Conference on Internet Monitoring and Protection, 2012
[62] An analysis of security, cost-effectiveness, and it compliance factors influencing cloud adoption by it managers
2012
[63] COMPUTAÇÃO NAS NUVENS NA CONSTRUÇÃO CIVIL: ESTUDO EXPLORATÓRIO DE POTENCIALIDADES DOS RECURSOS GRATUITOS DA AUTODESK CLOUD
Encontro Nacional de Tecnologia do Ambiente Construído, 2012
[64] COMPUTAÇÃO NAS NUVENS NA CONSTRUÇÃO CIVIL: ESTUDO EXPLORATÓRIO DE POTENCIALIDADES DOS RECURSOS GRATUITOS DA …
RSS de Melo
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top