• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

可信计算增强了云认证。

Trusted computing strengthens cloud authentication.

作者信息

Ghazizadeh Eghbal, Zamani Mazdak, Ab Manan Jamalul-lail, Alizadeh Mojtaba

机构信息

Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia.

MIMOS Berhad, Technology Park Malaysia, 57000 Kuala Lumpur, Malaysia.

出版信息

ScientificWorldJournal. 2014 Feb 18;2014:260187. doi: 10.1155/2014/260187. eCollection 2014.

DOI:10.1155/2014/260187
PMID:24701149
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC3948200/
Abstract

Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as security challenges while adopting more technologies became apparent. Trust Multi-tenancy and trusted computing based on a Trusted Platform Module (TPM) are great technologies for solving the trust and security concerns in the cloud identity environment. Single sign-on (SSO) and OpenID have been released to solve security and privacy problems for cloud identity. This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. Security analyzing, simulation, and BLP confidential model are three ways to evaluate and analyze our proposed model.

摘要

云计算是新一代技术,旨在提供商业必需品、解决IT管理问题并运行适当的应用程序。在内部处理的云功能列表中的另一个条目是身份访问管理(IAM)。随着采用更多技术,公司将IAM视为安全挑战变得明显起来。基于可信平台模块(TPM)的可信多租户和可信计算是解决云身份环境中信任和安全问题的优秀技术。单点登录(SSO)和OpenID已发布以解决云身份的安全和隐私问题。本文提出使用可信计算、联合身份管理和OpenID Web SSO来解决云中的身份盗窃问题。此外,该提议的模型已在.Net环境中进行了模拟。安全分析、模拟和BLP机密模型是评估和分析我们提议模型的三种方法。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/bca8396fc0ee/TSWJ2014-260187.021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/e79d792372d4/TSWJ2014-260187.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/c868abc895d1/TSWJ2014-260187.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/5e761bc754d2/TSWJ2014-260187.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/c08d0e817371/TSWJ2014-260187.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/8ce8e4a3b0e7/TSWJ2014-260187.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/c609c746c14d/TSWJ2014-260187.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/f818c8fcf64d/TSWJ2014-260187.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/8c01ec016493/TSWJ2014-260187.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/29f72ba71b15/TSWJ2014-260187.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/af9d04116ebd/TSWJ2014-260187.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/625d91dedd02/TSWJ2014-260187.011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/52a66b3220be/TSWJ2014-260187.012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/7c52dbbe58ae/TSWJ2014-260187.013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/d97841fba458/TSWJ2014-260187.014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/b754fd01c6c1/TSWJ2014-260187.015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/e24a2cc6a63c/TSWJ2014-260187.016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/a499ba307f1d/TSWJ2014-260187.017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/34ed2040e8c7/TSWJ2014-260187.018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/838ba3abe1a4/TSWJ2014-260187.019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/69567c17d07d/TSWJ2014-260187.020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/bca8396fc0ee/TSWJ2014-260187.021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/e79d792372d4/TSWJ2014-260187.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/c868abc895d1/TSWJ2014-260187.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/5e761bc754d2/TSWJ2014-260187.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/c08d0e817371/TSWJ2014-260187.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/8ce8e4a3b0e7/TSWJ2014-260187.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/c609c746c14d/TSWJ2014-260187.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/f818c8fcf64d/TSWJ2014-260187.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/8c01ec016493/TSWJ2014-260187.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/29f72ba71b15/TSWJ2014-260187.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/af9d04116ebd/TSWJ2014-260187.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/625d91dedd02/TSWJ2014-260187.011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/52a66b3220be/TSWJ2014-260187.012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/7c52dbbe58ae/TSWJ2014-260187.013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/d97841fba458/TSWJ2014-260187.014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/b754fd01c6c1/TSWJ2014-260187.015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/e24a2cc6a63c/TSWJ2014-260187.016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/a499ba307f1d/TSWJ2014-260187.017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/34ed2040e8c7/TSWJ2014-260187.018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/838ba3abe1a4/TSWJ2014-260187.019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/69567c17d07d/TSWJ2014-260187.020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d99e/3948200/bca8396fc0ee/TSWJ2014-260187.021.jpg

相似文献

1
Trusted computing strengthens cloud authentication.可信计算增强了云认证。
ScientificWorldJournal. 2014 Feb 18;2014:260187. doi: 10.1155/2014/260187. eCollection 2014.
2
A Smart Biometric Identity Management Framework for Personalised IoT and Cloud Computing-Based Healthcare Services.用于个性化物联网和基于云计算的医疗保健服务的智能生物识别身份管理框架。
Sensors (Basel). 2021 Jan 14;21(2):552. doi: 10.3390/s21020552.
3
OpenID Connect as a security service in cloud-based medical imaging systems.作为基于云的医学成像系统中的一种安全服务的开放ID连接。
J Med Imaging (Bellingham). 2016 Apr;3(2):026501. doi: 10.1117/1.JMI.3.2.026501. Epub 2016 Jun 16.
4
eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology.eTPM:一种基于 Intel SGX 技术的可信云平台 Enclave TPM 方案。
Sensors (Basel). 2018 Nov 6;18(11):3807. doi: 10.3390/s18113807.
5
Legal framework for health cloud: A systematic review.健康云的法律框架:系统评价。
Int J Med Inform. 2019 Dec;132:103953. doi: 10.1016/j.ijmedinf.2019.103953. Epub 2019 Aug 31.
6
A New Secure Model for Data Protection over Cloud Computing.云计算中数据保护的新型安全模型。
Comput Intell Neurosci. 2021 Nov 24;2021:8113253. doi: 10.1155/2021/8113253. eCollection 2021.
7
VisTAS: blockchain-based visible and trusted remote authentication system.VisTAS:基于区块链的可见且可信的远程认证系统。
PeerJ Comput Sci. 2021 May 12;7:e516. doi: 10.7717/peerj-cs.516. eCollection 2021.
8
Design of a Secure Medical Data Sharing Scheme Based on Blockchain.基于区块链的安全医疗数据共享方案设计。
J Med Syst. 2020 Jan 8;44(2):52. doi: 10.1007/s10916-019-1468-1.
9
Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.云辅助的远程医疗信息系统中的相互认证和隐私保护协议。
Comput Methods Programs Biomed. 2018 Apr;157:191-203. doi: 10.1016/j.cmpb.2018.02.002.
10
Cloud bursting galaxy: federated identity and access management.云爆发星系:联合身份与访问管理。
Bioinformatics. 2020 Jan 1;36(1):1-9. doi: 10.1093/bioinformatics/btz472.

引用本文的文献

1
Security Control of Denial-of-Service Attacks in Cyber-Physical Systems Based on Dynamic Feedback.基于动态反馈的信息物理系统中拒绝服务攻击的安全控制
Comput Intell Neurosci. 2022 Jun 13;2022:5472137. doi: 10.1155/2022/5472137. eCollection 2022.