|
|
Ardi Benusi       An identity management survey on cloud computing       International Journal of Computing and Optimization, Vol. 1, 2014, no. 2, 63-71
      http://dx.doi.org/10.12988/ijco.2014.458
Copyright © 2014 Ardi Benusi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Cited by (1):
Salim Ali Abbas, Enhancing the Security of Identity and Access Management in Cloud Computing using Elliptic Curve Cryptography, International Journal of Emerging Research in Management and Technology, 4 (2015), no. 7, 8-15 [View at Publisher]
|