Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 14
Page No. 2457 - 2463

Securing Cloud-Based Healthcare Information Systems Using Enhanced Password-Based Authentication Scheme

Authors : A. Jesudoss and N.P. Subramaniam

References

Armando, A., R. Carbone, L. Compagna, J. Cuellar, G. Pellegrino and A. Sorniotti, 2013. An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations. Comput. Security, 33: 41-58.
CrossRef  |  

Chou, T.S., 2013. Security threats on cloud computing vulnerabilities. Int. J. Comput. Sci. Inf. Technol., 5: 79-88.
CrossRef  |  Direct Link  |  

Emam, E.El., M. Koutb, H.M. Kelash and O.S. Faragallah, 2011. An authentication protocol based on kerberos 5. Int. J. Network Secur., 12: 159-170.

Hiltgen, A., T. Kramp and T. Weigold, 2006. Secure internet banking authentication. IEEE. Secur. Privacy, 4: 21-29.
CrossRef  |  Direct Link  |  

Jesudoss, A. and N.P. Subramaniam, 2014. Enhanced kerberos authentication for distributed environment. J. Theor. Appl. Inf. Technol., 69: 368-374.
Direct Link  |  

Kim, M., B. Lee, S. Kim and D. Won, 2009. Weaknesses and improvements of a one-time password authentication scheme. Int. J. Future Generation Commun. Networking, 2: 29-38.

Mathew, G. and S. Thomas, 2013. A novel multifactor authentication system ensuring usability and security. Preprint, 2: 21-30.
Direct Link  |  

Miculan, M. and C. Urban, 2011. Formal analysis of facebook connect single sign-on authentication protocol. SOFSEM., 11: 22-28.

Onwubiko, C. and A.P. Lenaghan, 2007. Managing security threats and vulnerabilities for small to medium enterprises. Proceedings of the IEEE Conference on Intelligence and Security Informatics, May 23-24, 2007, New Jersey, pp: 244-249.

Pangalos, G.J., 1996. Secure medical databases: Design and operation. Int. J. Biomed. Comput., 43: 53-60.
CrossRef  |  Direct Link  |  

Patel, P.N., J.K. Patel and P.V. Virparia, 2013. A cryptography application using salt hash technique. Int. J. Appl. Innovation Eng. Manage. IJAIEM., 2: 236-239.

Raza, M., M. Iqbal, M. Sharif and W. Haider, 2012. A survey of password attacks and comparative analysis on methods for secure authentication. World Appl. Sci. J., 19: 439-444.
Direct Link  |  

Renaud, K., 2004. Quantifying the quality of web authentication mechanisms: A usability perspective. J. Web Eng., 3: 95-123.

Syverson, P., 1994. A taxonomy of replay attacks. Proceedings of the 7th IEEE Workshop on Computer Security Foundations CSFW, June 14-16, 1994, IEEE, Franconia, Hampshire ISBN: 0-8186-6230-1, pp: 187-191.

Thing, V.L. and H.M. Ying, 2011. Rainbow table optimization for password recovery. Int. J. Adv. Software, 4: 479-488.

Wang, B., X. Wei and Q. Zhang, 2014. A novel and fast chaotic cryptosystem for image encryption. J. Comput. Theor. Nanosc., 11: 731-738.
Direct Link  |  

Zhang, Q. and L. Liu, 2013. DNA coding and chaos-based image encryption algorithm. J. Comput. Theor. Nanosci., 10: 341-346.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved