With the fast evolution of networks and Internet, appeared the concept of the Cloud, the requirements in terms of safety become more and more essential. This requires the introduction of advanced authentication methods, access control and identity management, while respecting the constraints of the services offered by this evolution, such as data exchange capacity and resources of terminals. The aim of our work is to propose cloud security architecture to be able to establish secure sessions between the nodes of a cluster in the cloud, and allow to different users a secure access to their data.
CITATION STYLE
Hamadi, H., Khireddine, A., & Tari, A. (2015). Cloud access secure with identity based cryptography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9395, pp. 109–118). Springer Verlag. https://doi.org/10.1007/978-3-319-25744-0_10
Mendeley helps you to discover research relevant for your work.