Recently, the amount of cloud service usage is increasing explosively. Specially, request of cloud service that use do computer or mobile communication device is very high in university or book related organ. However, level of security service is very low that against of amounts that using request in BRS (book retrieval system). Therefore, we wish to give other access grade in user in this research and propose easy and safe authentication method (ESAM: Easy and Secure Authentication Method using PMI) to book retrieval system so that access control and authentication about user may be available. Our proposed method based on PMI’s attributes certificate technique. And our scheme can solve various security problems on existent book retrieval system. After next study, we will investigate our propose method against of existent way and improve our method is more good.
ISBN 978-3-319-19577-3 ISBN 978-3-319-19578-0 (eBook) DOI 10.1007/978-3-319-19578-0 Library of Congress Control Number: 2015940015 Springer Cham Heidelberg New York Dordrecht London c IFIP International Federation for Information Processing 2015This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made.Printed on acid-free paper Springer International Publishing AG Switzerland is part of Springer Science+Business Media (www.springer.com) PrefaceThis volume contains research papers presented at the 5th IFIP International Conference on Computer Science and Its Applications (CIIA), held during May 20-21, 2015, in Saida, Algeria. CIIA 2015 continued the series of conferences whose main objective is to provide a forum for the dissemination of research accomplishments and to promote the interaction and collaboration between various research communities related to computer science and its applications. These conferences have been initiated by researchers from Algeria and extended to cover worldwide researchers focusing on promoting research, creating scientific networks, developing projects, as well as facilitating faculty and student exchanges, especially in Africa.This year the CIIA conference attracted 225 submissions from 20 countries including: Algeria, Bangladesh, Belgium, Canada, China, Finland, France, India, Iran, Ireland, Italy, Jordan, Morocco, Norway, Poland, Qatar, Tunisia, United Arab Emirates, UK, and USA. In a rigorous reviewing process, the Program Committee (PC) selected 51 papers, which represents an acceptance rate of 22.6%. The PC included 200 researchers from 27 countries.The accepted papers were organized into the four following research tracks: Computational Intelligence, co-chaired by: Sadok Ben Yahia (FST, Tunisia) and Nadjet Kamel (Setif University, Algeria); Security and Network Technologies, co-chaired by Nadjib Badache (CERIST, Algeria) and Alfredo Cuzzocrea (ICAR-CNR and University of Calabria, Italy); Information Technology, co-chaired by Jorge Bernardi...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.