Authentication and authorization in cloud computing using kerberos
The emergence of cloud computing paradigm offers attractive and innovative computing services. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. However, this technology introduces a new concern for enterprises and businesses regardin...
Saved in:
Main Author: | Hidar, Ahmad M. Saeed |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/41594/5/AhmadMSaeedHidarMFSKSM2014.pdf http://eprints.utm.my/id/eprint/41594/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Keystroke dynamic authentication in mobile cloud computing
by: Babaeizadeh, Mahnoush
Published: (2014) -
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021) -
A lightweight and robust authentication scheme for the healthcare system using public cloud server
by: Irshad, Ahmed Abbasi, et al.
Published: (2024) -
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
by: Ali , Hussain
Published: (2021) -
Proposed computer forensic approach for cloud computing environment
by: Ahmed, M., et al.
Published: (2016)