Isilon Credential Vault: An Authentication Provider
نویسندگان
چکیده
منابع مشابه
Authentication Without Identification using Anonymous Credential System
Privacy and security are often intertwined. For example, identity theft is rampant because we have become accustomed to authentication by identification. To obtain some service, we provide enough information about our identity for an unscrupulous person to steal it (for example, we give our credit card number to Amazon.com). One of the consequences is that many people avoid e-commerce entirely ...
متن کاملSelf-blindable Credential: Towards LightWeight Anonymous Entity Authentication
We are witnessing the rapid expansion of smart devices in our daily life. The need for individual privacy protection calls for anonymous entity authentication techniques with affordable efficiency upon the resource-constrained smart devices. Towards this objective, in this paper we propose self-blindable credential, a lightweight anonymous entity authentication primitive. We provide a formulati...
متن کاملEmc Isilon Onefs Operating System
This white paper provides an introduction to the EMC Isilon OneFS operating system, the foundation of the Isilon scale-out storage platform. The paper includes an overview of the architecture of OneFS and describes the benefits of a scale-out storage platform. July 2015 EMC ISILON ONEFS OPERATING SYSTEM Powering the Isilon Scale-out Storage Platform
متن کاملWeaknesses of Temporal Credential-Based Mutual Authentication with a Multiple-Password Scheme for Wireless Sensor Networks
Wireless sensor networks are significant technologies in various fields. For example, they are used for monitoring dangerous places, medical and environmental monitoring, and military surveillance. Various studies have focused on the authentication scheme for wireless sensor networks. However, it is difficult to achieve perfect security performance and low overhead. Liu et al. proposed a scheme...
متن کاملSelf-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices
We are witnessing the rapid expansion of smart devices in our daily life. The need for individual privacy protection calls for anonymous entity authentication techniques with affordable efficiency upon the resource-constrained smart devices. Towards this objective, in this paper we propose self-blindable credential, a lightweight anonymous entity authentication primitive. We provide a formulati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2019
ISSN: 2319-5940,2278-1021
DOI: 10.17148/ijarcce.2019.8611