An improved authentication protocol for distributed mobile cloud computing services.
Hoda JannatiBehnam BahrakPublished in: Int. J. Crit. Infrastructure Prot. (2017)
Keyphrases
- cloud computing
- middleware architecture
- computing infrastructure
- authentication protocol
- service providers
- internet services
- computing resources
- distributed computing
- cloud computing environment
- computing environments
- cloud platform
- mobile agents
- private cloud
- cloud services
- data center
- lightweight
- data management
- network access
- smart card
- distributed systems
- mobile applications
- service level agreements
- security analysis
- mobile services
- cloud storage
- utility computing
- loosely coupled
- software as a service
- real time
- smart phones
- mobile phone
- rfid tags
- service oriented
- distributed environment
- context aware
- computer networks
- load balancing
- secret key
- security issues
- security protocols
- grid computing
- mobile technologies
- cost effective
- peer to peer
- mobile devices