2017
DOI: 10.17577/ijertv6is030084
|View full text |Cite
|
Sign up to set email alerts
|

Kerberos System to Cloud for Virtual Resource Authentication

Abstract: The security of the virtual network will not benefit from using authentication method with the most promise for security unless both the way it is coded and the way it is implemented is equally as secure. It is essential to choose strong authentication algorithms which enforce good protection. The importance of the resource authentication process is the ability of the client to access and use the resource. A pseudo code was developed for the data center which is used to authenticate the client to use the resou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The obtained results of experimental work were compared with the results of the numerical finite element model. Kumar, C.Sathish, and Rao [5] investigated the natural frequencies of fabricated laminated E-glass fiber reinforced composite beams made using hand-lay-up process. They characterize the mechanical properties of the laminated beam by using simple rule-of-mixtures.…”
Section: Introductionmentioning
confidence: 99%
“…The obtained results of experimental work were compared with the results of the numerical finite element model. Kumar, C.Sathish, and Rao [5] investigated the natural frequencies of fabricated laminated E-glass fiber reinforced composite beams made using hand-lay-up process. They characterize the mechanical properties of the laminated beam by using simple rule-of-mixtures.…”
Section: Introductionmentioning
confidence: 99%