Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing

    Amjad Alsirhani, Mohamed Ezz, Ayman Mohamed Mostafa*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 967-984, 2022, DOI:10.32604/csse.2022.024854

    Abstract Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome… More >

  • Open Access

    ARTICLE

    A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications

    Wael Said1, Elsayed Mostafa1,*, M. M. Hassan1, Ayman Mohamed Mostafa2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3193-3209, 2022, DOI:10.32604/cmc.2022.023554

    Abstract User's data is considered as a vital asset of several organizations. Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns. Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment. The data stored on the public cloud will be vulnerable to outside and inside attacks. This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud. Different access control policies are applied for verifying users on the cloud. A security mechanism is… More >

  • Open Access

    ARTICLE

    Identity Governance Framework for Privileged Users

    Mansour Hammoud Alruwies1, Shailendra Mishra2,*, Mohammed Abdul Rahman AlShehri1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 995-1005, 2022, DOI:10.32604/csse.2022.019355

    Abstract Information technology companies have grown in size and recognized the need to protect their valuable assets. As a result, each IT application has its authentication mechanism, and an employee needs a username and password. As the number of applications increased, as a result, it became increasingly complex to manage all identities like the number of usernames and passwords of an employee. All identities had to be retrieved by users. Both the identities and the access rights associated with those identities had to be protected by an administrator. Management couldn’t even capture such access rights because they couldn’t verify things like… More >

Displaying 1-10 on page 1 of 3. Per Page