Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol.
Umer KhalidAbdul Ghafoor AbbasiMisbah IrumMuhammad Awais ShibliPublished in: KES (2013)
Keyphrases
- authentication protocol
- mutual authentication
- security requirements
- security analysis
- access control
- security properties
- identity management
- smart card
- trusted third party
- security mechanisms
- rfid systems
- user authentication
- security protocols
- homomorphic encryption
- cryptographic protocols
- covert channel
- password authentication
- key distribution
- authentication scheme
- lightweight
- authentication mechanism
- session key
- public key
- security services
- cloud computing
- key agreement
- security model
- privacy protection
- rfid tags
- user privacy
- access control policies
- security policies
- privacy preserving
- secure multiparty computation
- digital signature
- secret key
- key agreement protocol
- conflict resolution
- diffie hellman
- data security
- trust relationships
- data sharing
- private key
- trust negotiation
- security issues
- personal information
- information security
- data management
- personal data
- key management
- third party