{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:41:19Z","timestamp":1743111679187,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685267"},{"type":"electronic","value":"9783319685274"}],"license":[{"start":{"date-parts":[[2017,9,24]],"date-time":"2017-09-24T00:00:00Z","timestamp":1506211200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-68527-4_6","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T02:39:20Z","timestamp":1506134360000},"page":"51-63","source":"Crossref","is-referenced-by-count":2,"title":["An Improved Scheme of Secure Access and Detection of Cloud Front-End Device"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1515-8663","authenticated-orcid":false,"given":"Xiao-Bao","family":"Yang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6548-6070","authenticated-orcid":false,"given":"Yan-Ping","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9516-1947","authenticated-orcid":false,"given":"Yue-Lei","family":"Xiao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., Bui, N., Castellani, A., Vangelista, L.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014). doi:\n10.1109\/JIOT.2014.2306328","journal-title":"IEEE Internet Things J."},{"issue":"C","key":"6_CR2","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., Donato, W.D., Persico, V., Pescap\u00e9, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56(C), 684\u2013700 (2016). doi:\n10.1016\/j.future.2015.09.021","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"6_CR3","first-page":"21","volume":"3","author":"M Kashif","year":"2013","unstructured":"Kashif, M., Palaniappan, S.: Framework for secure cloud computing. Adv. Int. J. Cloud Comput.: Serv. Archit. (IJCCSA) 3(2), 21\u201335 (2013). \nhttp:\/\/airccse.org\/journal\/ijccsa\/papers\/3213ijccsa02.pdf","journal-title":"Adv. Int. J. Cloud Comput.: Serv. Archit. (IJCCSA)"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Fong, P.W.L.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, 191\u2013201. ACM (2011). doi:\n10.1145\/1943513.1943539","DOI":"10.1145\/1943513.1943539"},{"key":"6_CR5","unstructured":"Hurst, R.M., Manaktala, E.H., Mayfield, P.G., et al.: Network access protection: U.S. Patent 7, 793, 096[P], 2010-9-7"},{"issue":"4","key":"6_CR6","doi-asserted-by":"crossref","first-page":"706","DOI":"10.3724\/SP.J.1016.2010.00706","volume":"33","author":"H Zhang","year":"2010","unstructured":"Zhang, H., Chen, L., Zhang, L.: Research on trusted network connection. J. Chin. J. Comput. 33(4), 706\u2013717 (2010). (in Chinese)","journal-title":"J. Chin. J. Comput."},{"issue":"3","key":"6_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.jnca.2015.10.005","volume":"61","author":"M Alizadeh","year":"2016","unstructured":"Alizadeh, M., Abolfazli, S., Zamani, M., et al.: Authentication in mobile cloud computing: a survey. J. Netw. Comput. Appl. 61(3), 59\u201380 (2016). doi:\n10.1016\/j.jnca.2015.10.005","journal-title":"J. Netw. Comput. Appl."},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Hirano, M., Okuda, T., Yamaguchi, S.: Application for a simple device authentication framework: device authentication middleware using novel smart card software. In: International Symposium on Applications and the Internet Workshops, SAINT Workshops 2007, p. 31. IEEE, Hiroshima (2007). doi:\n10.1109\/SAINT-W.2007.26","DOI":"10.1109\/SAINT-W.2007.26"},{"key":"6_CR9","first-page":"28","volume":"6","author":"XH Chen","year":"2014","unstructured":"Chen, X.H.: The study of multi-business authentication access is based on the technology of DHCPv6. J. Cable Technol. 6, 28\u201330 (2014)","journal-title":"J. Cable Technol."},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.simpat.2014.10.011","volume":"51","author":"YX Lai","year":"2015","unstructured":"Lai, Y.X., Chen, Y.N., Zou, Q.C., et al.: Design and analysis on trusted network equipment access authentication protocol. Simul. Model. Pract. Theory 51, 157\u2013169 (2015). doi:\n10.1016\/j.simpat.2014.10.011","journal-title":"Simul. Model. Pract. Theory"},{"issue":"1","key":"6_CR11","first-page":"54","volume":"4","author":"M Balkhi","year":"2014","unstructured":"Balkhi, M.: A view of cloud computing. Int. J. Innov. Sci. Res. 4(1), 54\u201360 (2014)","journal-title":"Int. J. Innov. Sci. Res."},{"key":"6_CR12","unstructured":"Mohamed, A., Grundy, J., M\u00fcller I.: An analysis of the cloud computing security problem. arXiv preprint \narXiv:1609.01107\n\n (2016)"},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978). doi:\n10.1145\/359340.359342","journal-title":"Commun. ACM"},{"issue":"8","key":"6_CR14","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.3724\/SP.J.1016.2009.01493","volume":"32","author":"Y Liu","year":"2009","unstructured":"Liu, Y., Xiong, R., Chu, J.: Quick attribute reduction algorithm with hash. Chin. J. Comput. 32(8), 1493\u20131499 (2009). doi:\n10.3724\/SP.J.1016.2009.01493","journal-title":"Chin. J. Comput."},{"issue":"4","key":"6_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.5120\/15489-4227","volume":"89","author":"V Patel","year":"2014","unstructured":"Patel, V., Patel, R.: Improving the security of SSO in distributed computer network using digital certificate and one time password (OTP). Int. J. Comput. Appl. 89(4), 10\u201314 (2014). doi:\n10.5120\/15489-4227","journal-title":"Int. J. Comput. Appl."},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"Liu, C.-W., Tsai, C.-Y., Hwang, M.-S.: Cryptanalysis of an efficient and secure smart card based password authentication scheme. In: Recent Developments in Intelligent Systems and Interactive Applications, pp. 188\u2013193. Springer, Cham (2017). doi:\n10.1007\/978-3-319-49568-2_26","DOI":"10.1007\/978-3-319-49568-2_26"},{"key":"6_CR17","doi-asserted-by":"publisher","unstructured":"Dua, G., Gautam, N., Sharma, D., et al.: Replay attack prevention in kerberos authentication protocol using triple password. 5(2), 449\u2013457 (2013). doi:\n10.5121\/ijcnc.2013.5205","DOI":"10.5121\/ijcnc.2013.5205"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Kandala, S., Sandhu, R., Bhamidipati, V.: An attribute based framework for risk-adaptive access control models. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 236\u2013241. IEEE (2011). doi:\n10.1109\/ARES.2011.41","DOI":"10.1109\/ARES.2011.41"},{"key":"6_CR19","unstructured":"Olufunso, D.A., Kayode, A.B., Adebayo, A.O.: Secured cloud application platform using elliptic curve cryptography. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 1 (2016)"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Zhao, K.X., Cui, J., Xie, Z.Q.: Algebraic cryptanalysis scheme of AES-256 using Gr\u00f6bner basis. J. Electr. Comput. Eng. 2017 (2017). doi:\n10.1155\/2017\/9828967","DOI":"10.1155\/2017\/9828967"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1016\/j.procs.2016.02.108","volume":"78","author":"P Patil","year":"2016","unstructured":"Patil, P., Narayankar, P., Narayan, D.G., et al.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Proc. Comput. Sci. 78, 617\u2013624 (2016). doi:\n10.1016\/j.procs.2016.02.108","journal-title":"Proc. Comput. Sci."},{"key":"6_CR22","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MSP.2011.65","volume":"9","author":"MG Li","year":"2011","unstructured":"Li, M.G.: Study on public key infrastructure in support of public key cryptographic algorithm SM2 based on elliptic curves. Inf. Secur. Commun. Priv. 9, 78\u201380 (2011)","journal-title":"Inf. Secur. Commun. Priv."},{"issue":"3","key":"6_CR23","first-page":"3033","volume":"2","author":"AL Jeeva","year":"2012","unstructured":"Jeeva, A.L., Palanisamy, D.V., Kanagaram, K.: Comparative analysis of performance efficiency and security measures of some encryption algorithms. Int. J. Eng. Res. Appl. (IJERA) 2(3), 3033\u20133037 (2012)","journal-title":"Int. J. Eng. Res. Appl. (IJERA)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68527-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T06:08:10Z","timestamp":1506492490000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68527-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,24]]},"ISBN":["9783319685267","9783319685274"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68527-4_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,9,24]]}}}