期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Authentication Mechanism for Secret Sharing Using Boolean Operation
1
作者 Yi-Hui Chen Pei-Yu Lin 《Journal of Electronic Science and Technology》 CAS 2012年第3期195-198,共4页
A lossless image secret sharing using a simple Boolean operation is proposed. The concept of visual cryptography in the secret sharing scheme is used to redesign a lossless secret sharing scheme. To ensure that the re... A lossless image secret sharing using a simple Boolean operation is proposed. The concept of visual cryptography in the secret sharing scheme is used to redesign a lossless secret sharing scheme. To ensure that the reconstructed image is the true secret image, an authentication mechanism is imported into the proposed scheme to verify whether the shadows are authentic before reconstructing the secret image. The proposed scheme delivers much more effective performance than Chen and Wu's scheme. 展开更多
关键词 authentication mechanism visualcryptography visual secret sharing.
下载PDF
Advanced Authentication Mechanisms for Identity and Access Management inCloud Computing
2
作者 Amjad Alsirhani Mohamed Ezz Ayman Mohamed Mostafa 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期967-984,共18页
Identity management is based on the creation and management of useridentities for granting access to the cloud resources based on the user attributes.The cloud identity and access management (IAM) grants the authoriza... Identity management is based on the creation and management of useridentities for granting access to the cloud resources based on the user attributes.The cloud identity and access management (IAM) grants the authorization tothe end-users to perform different actions on the specified cloud resources. Theauthorizations in the IAM are grouped into roles instead of granting them directlyto the end-users. Due to the multiplicity of cloud locations where data resides anddue to the lack of a centralized user authority for granting or denying cloud userrequests, there must be several security strategies and models to overcome theseissues. Another major concern in IAM services is the excessive or the lack ofaccess level to different users with previously granted authorizations. This paperproposes a comprehensive review of security services and threats. Based on thepresented services and threats, advanced frameworks for IAM that provideauthentication mechanisms in public and private cloud platforms. A threat modelhas been applied to validate the proposed authentication frameworks with different security threats. The proposed models proved high efficiency in protectingcloud platforms from insider attacks, single sign-on failure, brute force attacks,denial of service, user privacy threats, and data privacy threats. 展开更多
关键词 Identity management cloud computing security threats and authentication mechanisms
下载PDF
A Digital Right Management Model for Distribution of Digital Audiovisual Content
3
作者 FAN Kefeng PEI Qingqi +2 位作者 WANG Meihua MO Wei CAO Ling 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1877-1881,共5页
This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, ... This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, the necessary protocol for the copyright control and content distribution, the authentication mechanism which offer consumption registration for content fair distribution, of the model are all provided. The scheme also provides distribution and evidence for using the copyright of digital content fairly and effectively. Finally, analysis shows the proposed model has both high security and good performance. 展开更多
关键词 digital rights management content distribution authentication mechanism MODEL
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部