Login / Signup
A Hybrid Approach for Highly Available and Secure Storage of Pseudo-SSO Credentials.
Jan Zibuschka
Lothar Fritsch
Published in:
NordSec (2012)
Keyphrases
</>
user privacy
access control
cryptographic protocols
cloud storage
replicated databases
storage systems
storage requirements
data storage
file system
identity management
security issues
security requirements
random access
security mechanisms
key management
user authentication
lightweight
social networks