首页    期刊浏览 2025年03月02日 星期日
登录注册

文章基本信息

  • 标题:Comparative Analysis of Various Authentication Techniques in Cloud Computing
  • 本地全文:下载
  • 作者:SHABNAM SHARMA ; USHA MITTAL
  • 期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
  • 印刷版ISSN:2347-6710
  • 电子版ISSN:2319-8753
  • 出版年度:2013
  • 卷号:2
  • 期号:4
  • 页码:994
  • 出版社:S&S Publications
  • 摘要:Over the recent years, there is a great advancement in the field of Computer Science. Cloud Computing isthe result of advancement in the existing technologies. It shares the characteristics with Autonomic Computing, Client-Server Model, Grid Computing, Mainframe Computer, Utility Computing, Peer-to-Peer and Cloud Gaming. CloudComputing is beneficial not only for users but also for large and small organizations. Security issues are the majorconcern in Cloud Computing. In this paper, our focus is on the authentication techniques used for verifying the clientidentity to the Cloud Broker.
  • 关键词:Kerberos; Key Distribution Centre; Public Key Infrastructure
国家哲学社会科学文献中心版权所有