2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE) 2014
DOI: 10.1109/iscaie.2014.7010205
|View full text |Cite
|
Sign up to set email alerts
|

SUAS: Scalable user authentication scheme for secure accessing to cloud-based environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…As was explained, security concerns are the most challenging issues in cloud computing environments as an emerging technology. Hence, access control and user authentication procedures as two of the most important parts of security issues [14] have been specified in this research. Therefore, cloud computing benefits and disadvantages were explained in the first part.…”
Section: Discussionmentioning
confidence: 99%
“…As was explained, security concerns are the most challenging issues in cloud computing environments as an emerging technology. Hence, access control and user authentication procedures as two of the most important parts of security issues [14] have been specified in this research. Therefore, cloud computing benefits and disadvantages were explained in the first part.…”
Section: Discussionmentioning
confidence: 99%
“…Scalable user authentication for a secure access to basic cloud environments [5] SUAS model provides scalability. It increases reliability and efficiency in cloud computing environments.…”
mentioning
confidence: 99%