Cognitive codes for authentication and management in cloud computing infrastructures

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper will describe new approaches in creation of cognitive codes for authentication tasks. Authentication procedure will be connected with visual CAPTCHA, which require specific information or expert-knowledge. Authentication protocols will be used to allow access for trusted group of persons, based of theirs expertise and professional activities. For new authentication protocols some possible examples of applications will be presented especially implemented in distributed computing environment.

Cite

CITATION STYLE

APA

Ogiela, M. R., & Ogiela, L. (2019). Cognitive codes for authentication and management in cloud computing infrastructures. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 24, pp. 160–166). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-02607-3_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free