Essays about: "OpenID"

Showing result 11 - 13 of 13 essays containing the word OpenID.

  1. 11. Securing Cloud Storage Service

    University essay from KTH/Kommunikationssystem, CoS

    Author : Vytautas Zapolskas; [2012]
    Keywords : Cloud; storage; security; privacy; zero knowledge; Security as a Service; federation; broker; Cloud Service Provider CSP ; federated cloud; federated identity management; OAuth; OpenID; CDMI; interoperability;

    Abstract : Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services becomes increasingly important, because for many organizations, the final barrier to adopting cloud computing is whether it is sufficiently secure. READ MORE

  2. 12. Decentralized Authentication in OpenStack Nova : Integration of OpenID

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Rasib Hassan Khan; [2011]
    Keywords : Authentication; EC2API; OpenID; OpenStack Nova; OSAPI; Security;

    Abstract : The evolution of cloud computing is driving the next generation of internet services. OpenStack is one of the largest open-source cloud computing middleware development communities. Currently, OpenStack supports platform specific signatures and tokens for user authentication. READ MORE

  3. 13. Comparison of Liberty Alliance and OpenID regarding their ability to protect the confidentiality, integrity and availability of the users’ information : a study based on the analysis of resistance to common attacks

    University essay from Högskolan i Skövde/Institutionen för kommunikation och information

    Author : Jaqueline de Souza; [2010]
    Keywords : WebSSO; OpenID; Liberty Alliance; information security; attacks;

    Abstract : It is essential to solve the problem due to password fatigue in order to increase the security of the transactions on the Web and secure the users’ account and information. Web Single Sign-On is one of the techniques that have been created to solve these issues. Unfortunately, this method creates new opportunities for hackers. READ MORE