An Efficient Windows Cardspace identity Management Technique in Cloud Computing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Cloud computing provides the shared infrastructure to the user this lead to the privacy and security violation. Privacy is regarding to the user’s sensitive information that resides onto the cloud, unauthorized secondary usage of the data. Windows Cardspace is a digital identity management system that deals with the privacy. It is managed the digital identities inform of Security Token. This paper described the shortcoming of the windows Cardspace that direct to a privacy violation. First issue is reliance on the single layer authentication, second is relying on service provider judgment and third is token storage on cloud. This proposed work will overcome the limitation of the windows cardspace identity management solution
Authors and Affiliations
Smita Saini , Deep Mann
Clustering and Classification of Cancer Data Using Soft Computing Technique
Clustering and classification of cancer data has been used with success in field of medical side. In this paper the two algorithm K-means and fuzzy C-means proposed for the comparison and find the accuracy of &nb...
A Generalized Study on Encryption Techniques for Location Based Services
Abstract: Location-based service (LBS) is the concept that denotes applications integrating geographic location (i.e., spatial coordinates) with the general notion of services. Examples of such applications include...
Digital Image Compression using Hybrid Transform with Kekre Transform and Other Orthogonal Transforms
This paper presents image compression technique using hybrid transform. Concept of hybrid wavelet transform can be extended to generate hybrid transform. In hybrid wavelet transform first few rows represent  ...
The Native Java Programming Language has suffered a Continuing Series of Vulnerabilities during the Past Two or More Years that Threaten to Destabilize Our Internet Technology.
The native Java Programming Language whose importance to the internet cannot be over emphasised, has suffered series of vulnerabilities that threaten to destabilize the Internet Technology. Most of the vulnerabil...
Sentiment of Sentence in Tweets: A Review
Abstract: Determine the sentiment of sentence that is positive or negative based on the presence of part of speech tag, the emoticons present in the sentences. For this research we use the most popular microblogging sitt...