Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

secure mobile cloud computing

biblio

Visible to the public A Multi-token Authorization Strategy for Secure Mobile Cloud Computing

Submitted by BrandonB on Wed, 05/06/2015 - 1:22pm
  • multitoken authorization strategy
  • security
  • Secure Mobile Computing
  • secure mobile cloud computing
  • radio links
  • privacy
  • Organizations
  • omnipresent mobile-based clients
  • OAuth
  • security of data
  • Modified Identity Management System
  • mobile computing
  • Mobile communication
  • mobile cloud computing
  • mathematical modeling
  • mathematical analysis
  • malicious code
  • IdM
  • Computer hacking
  • trust
  • traffic interception
  • identity management systems
  • identity management system
  • Hacker
  • data privacy
  • credentials
  • computing models
  • vulnerable wireless communication links
  • cloud resources
  • cloud computing security
  • Cloud Computing
  • authorization architecture
  • authorization
  • authorisation
  • Access Control
  • Servers

Terms of Use  |  ©2023. CPS-VO