Implementation of User Authentication Processes for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain.
Kazuya OdagiriShogo ShimizuNaohiro IshiiPublished in: CSII (2019)
Keyphrases
- network management
- user authentication
- authentication scheme
- remote user authentication scheme
- security analysis
- computer networks
- ip networks
- network traffic
- network monitoring
- security policies
- graphical password
- smart card
- cloud computing
- access control policies
- authentication protocol
- mobile agents
- information security
- fault management
- secret key
- biometric systems
- lightweight
- keystroke dynamics
- information systems