{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:28Z","timestamp":1750220728664,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T00:00:00Z","timestamp":1585612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,31]]},"DOI":"10.1145\/3386723.3387875","type":"proceedings-article","created":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T18:06:11Z","timestamp":1590429971000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud"],"prefix":"10.1145","author":[{"given":"Nickson M.","family":"Karie","sequence":"first","affiliation":[{"name":"Department of Computer Science Edith Cowan University Joondalup, Australia"}]},{"given":"Victor R.","family":"Kebande","sequence":"additional","affiliation":[{"name":"Department of Computer Science Malm\u00f6 Universitet Nordenski\u00f6ldsgatan, Malm\u00f6 Sweden"}]},{"given":"Richard A.","family":"Ikuesan","sequence":"additional","affiliation":[{"name":"Department of Computer Science Qatar Community College Qatar"}]},{"given":"Mehdi","family":"Sookhak","sequence":"additional","affiliation":[{"name":"School of information Technology, Illinois State University, Normal, IL, USA"}]},{"given":"H. S.","family":"Venter","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Pretoria, Pretoria, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2020,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Single sign-on (SSO). Available at: http:\/\/searchsecurity.techtarget.com\/definition\/single-sign-on [Accessed 13th","author":"Rouse M","year":"2016","unstructured":"Rouse , M and Teravainen , T . ( 2016 ). Single sign-on (SSO). Available at: http:\/\/searchsecurity.techtarget.com\/definition\/single-sign-on [Accessed 13th February, 2018] Rouse, M and Teravainen, T. (2016). Single sign-on (SSO). Available at: http:\/\/searchsecurity.techtarget.com\/definition\/single-sign-on [Accessed 13th February, 2018]"},{"key":"e_1_3_2_1_2_1","volume-title":"National Conference on Computational and Mathematical Sciences,\" in COMPUTATIA-IV","author":"Jain S.","year":"2014","unstructured":"S. Jain , S. Kumawat , R. Kumar and S. Kumar , \" National Conference on Computational and Mathematical Sciences,\" in COMPUTATIA-IV , 2014 . S. Jain, S. Kumawat, R. Kumar and S. Kumar, \"National Conference on Computational and Mathematical Sciences,\" in COMPUTATIA-IV, 2014."},{"issue":"5","key":"e_1_3_2_1_3_1","first-page":"247","article-title":"Cloud computing security issues and challenges","volume":"3","author":"Kuyoro F.","year":"2011","unstructured":"S. O. Kuyoro , F. Ibikunle and O. Awodele , \" Cloud computing security issues and challenges ,\" International Journal of Computer Networks (IJCN) , vol. 3 , no. 5 , pp. 247 -- 255 , 2011 . S. O. Kuyoro, F. Ibikunle and O. Awodele, \"Cloud computing security issues and challenges,\" International Journal of Computer Networks (IJCN), vol. 3, no. 5, pp. 247--255, 2011.","journal-title":"International Journal of Computer Networks (IJCN)"},{"key":"e_1_3_2_1_4_1","volume-title":"Available: https:\/\/cloudintegration.wordpress.com\/2009\/12\/17\/idc-publishes-cloud-services-benefits-and-challenges\/amp\/. [Accessed","author":"Gens","year":"2018","unstructured":"F. Gens , \"Wordpress,\" 17 December 2009. [Online]. Available: https:\/\/cloudintegration.wordpress.com\/2009\/12\/17\/idc-publishes-cloud-services-benefits-and-challenges\/amp\/. [Accessed 23 February 2018 ]. F. Gens, \"Wordpress,\" 17 December 2009. [Online]. Available: https:\/\/cloudintegration.wordpress.com\/2009\/12\/17\/idc-publishes-cloud-services-benefits-and-challenges\/amp\/. [Accessed 23 February 2018]."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijccsa.2016.6601"},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"2423","article-title":"Study on Cloud Computing Model and its Benefits, Challenges","volume":"2","author":"Kavitha","year":"2014","unstructured":"K. Kavitha , \" Study on Cloud Computing Model and its Benefits, Challenges ,\" International Journal of Innovative Research in Computer and Communication Engineering , vol. 2 , no. 1 , pp. 2423 -- 2431 , 2014 . K. Kavitha, \"Study on Cloud Computing Model and its Benefits, Challenges,\" International Journal of Innovative Research in Computer and Communication Engineering, vol. 2, no. 1, pp. 2423--2431, 2014.","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"e_1_3_2_1_7_1","unstructured":"[M. Lebied \"The datapine Blog \" 13 January 2017. [Online]. Available: https:\/\/www.datapine.com\/blog\/top-6-cloud-computing-challenges\/. [Accessed 24 02 2018].  [M. Lebied \"The datapine Blog \" 13 January 2017. [Online]. Available: https:\/\/www.datapine.com\/blog\/top-6-cloud-computing-challenges\/. [Accessed 24 02 2018]."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2011143.2011146"},{"key":"e_1_3_2_1_9_1","volume-title":"Google Patents","author":"Hardt","year":"2008","unstructured":"D. C. Hardt , \"Distributed hierarchical identity management system authentication mechanisms,\" ed: Google Patents , 2008 . D. C. Hardt, \"Distributed hierarchical identity management system authentication mechanisms,\" ed: Google Patents, 2008."},{"key":"e_1_3_2_1_10_1","volume-title":"Authentication mechanisms for call control message integrity and origin verification,\" ed: Google Patents","author":"Dunn C. E.","year":"2009","unstructured":"J. H. Dunn and C. E. Martin , \" Authentication mechanisms for call control message integrity and origin verification,\" ed: Google Patents , 2009 . J. H. Dunn and C. E. Martin, \"Authentication mechanisms for call control message integrity and origin verification,\" ed: Google Patents, 2009."},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Authentication in the clouds: a framework and its application to mobile users,\" in Proceedings of the 2010 ACM workshop on Cloud computing security workshop","author":"Chow M.","year":"2010","unstructured":"R. Chow , M. Jakobsson , R. Masuoka , J. Molina , Y. Niu , E. Shi , et al. , \" Authentication in the clouds: a framework and its application to mobile users,\" in Proceedings of the 2010 ACM workshop on Cloud computing security workshop , 2010 , pp. 1 -- 6 . R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, et al., \"Authentication in the clouds: a framework and its application to mobile users,\" in Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 2010, pp. 1--6."},{"key":"e_1_3_2_1_12_1","first-page":"263","volume-title":"2010 19th IEEE International Workshop on","author":"Celesti F.","year":"2010","unstructured":"A. Celesti , F. Tusa , M. Villari , and A. Puliafito , \" Security and cloud computing: Intercloud identity management infrastructure,\" in Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE) , 2010 19th IEEE International Workshop on , 2010 , pp. 263 -- 265 . A. Celesti, F. Tusa, M. Villari, and A. Puliafito, \"Security and cloud computing: Intercloud identity management infrastructure,\" in Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 2010 19th IEEE International Workshop on, 2010, pp. 263--265."},{"key":"e_1_3_2_1_13_1","first-page":"110","volume-title":"2011 IEEE Asia-Pacific","author":"Choudhury P.","year":"2011","unstructured":"A. J. Choudhury , P. Kumar , M. Sain , H. Lim , and H. Jae-Lee , \" A strong user authentication framework for cloud computing,\" in Services Computing Conference (APSCC) , 2011 IEEE Asia-Pacific , 2011 , pp. 110 -- 115 . A. J. Choudhury, P. Kumar, M. Sain, H. Lim, and H. Jae-Lee, \"A strong user authentication framework for cloud computing,\" in Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific, 2011, pp. 110--115."},{"key":"e_1_3_2_1_14_1","first-page":"302","volume-title":"2011 International Conference on","author":"Zhu Q.-H.","year":"2011","unstructured":"H.-H. Zhu , Q.-H. He , H. Tang , and W.-H. Cao , \"Voiceprint-biometric template design and authentication based on cloud computing security,\" in Cloud and Service Computing (CSC) , 2011 International Conference on , 2011 , pp. 302 -- 308 . H.-H. Zhu, Q.-H. He, H. Tang, and W.-H. Cao, \"Voiceprint-biometric template design and authentication based on cloud computing security,\" in Cloud and Service Computing (CSC), 2011 International Conference on, 2011, pp. 302--308."},{"key":"e_1_3_2_1_15_1","volume-title":"Reviews on Security Issues and Challenges in Cloud Computing,\" in IOP Conference Series: Materials Science and Engineering","author":"An Z. F.","year":"2016","unstructured":"Y. Z. An , Z. F. Zaaba and N. F. Samsudin , \" Reviews on Security Issues and Challenges in Cloud Computing,\" in IOP Conference Series: Materials Science and Engineering , 2016 . Y. Z. An, Z. F. Zaaba and N. F. Samsudin, \"Reviews on Security Issues and Challenges in Cloud Computing,\" in IOP Conference Series: Materials Science and Engineering, 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.05.019"},{"key":"e_1_3_2_1_17_1","volume-title":"Pick Location Security: Seamless Integrated Multi-Factor Authentication,\" in IST Africa","author":"Ramatsakane S. W.","year":"2017","unstructured":"K. I. Ramatsakane and S. W. Leung , \" Pick Location Security: Seamless Integrated Multi-Factor Authentication,\" in IST Africa , 2017 . K. I. Ramatsakane and S. W. Leung, \"Pick Location Security: Seamless Integrated Multi-Factor Authentication,\" in IST Africa, 2017."},{"key":"e_1_3_2_1_18_1","volume-title":"Multi-Factor Authentication on Cloud,\" in 2015 International Conference on Digital Image Computing: Techniques and Applications (DICTA)","author":"Khan M. A.","year":"2015","unstructured":"S. H. Khan and M. A. Akbar , \" Multi-Factor Authentication on Cloud,\" in 2015 International Conference on Digital Image Computing: Techniques and Applications (DICTA) , 2015 . S. H. Khan and M. A. Akbar, \"Multi-Factor Authentication on Cloud,\" in 2015 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2015."},{"key":"e_1_3_2_1_19_1","volume-title":"The Framework for Efficient Passphrase-based Multifactor Authentication in Cloud Computing,\" in 2016 22nd International Conference on Automation and Computing (ICAC)","author":"Rehman M.","year":"2016","unstructured":"F. Rehman and M. Shah , \" The Framework for Efficient Passphrase-based Multifactor Authentication in Cloud Computing,\" in 2016 22nd International Conference on Automation and Computing (ICAC) , 2016 . F. Rehman and M. Shah, \"The Framework for Efficient Passphrase-based Multifactor Authentication in Cloud Computing,\" in 2016 22nd International Conference on Automation and Computing (ICAC), 2016."},{"issue":"2","key":"e_1_3_2_1_20_1","first-page":"143","article-title":"Efficient Password-based Two Factors Authentication in Cloud Computing","volume":"6","author":"Yassin A.","year":"2012","unstructured":"A. A. Yassin , A. Ibrahim and D. Zou , \" Efficient Password-based Two Factors Authentication in Cloud Computing ,\" International Journal of Security and Its Applications , vol. 6 , no. 2 , pp. 143 -- 148 , 2012 . A. A. Yassin, A. Ibrahim and D. Zou, \"Efficient Password-based Two Factors Authentication in Cloud Computing,\" International Journal of Security and Its Applications, vol. 6, no. 2, pp. 143--148, 2012.","journal-title":"International Journal of Security and Its Applications"},{"key":"e_1_3_2_1_21_1","volume-title":"Common Vulnerability Scoring System v3.0. Available at: https:\/\/www.certsi.es\/en\/blog\/cvss-3-en [Accessed 13th","author":"L\u00f3pez A.","year":"2015","unstructured":"L\u00f3pez , A. ( 2015 ). Common Vulnerability Scoring System v3.0. Available at: https:\/\/www.certsi.es\/en\/blog\/cvss-3-en [Accessed 13th February, 2018]. L\u00f3pez, A. (2015). Common Vulnerability Scoring System v3.0. Available at: https:\/\/www.certsi.es\/en\/blog\/cvss-3-en [Accessed 13th February, 2018]."},{"key":"e_1_3_2_1_22_1","volume-title":"A Complete Guide to the Common Vulnerability Scoring System Version 2.0. Availabale t: http:\/\/www.nazimkaradag.com\/wp-content\/uploads\/2014\/11\/cvss-guide.pdf [Accessed 25th","author":"Mell P.","year":"2007","unstructured":"Mell , P. , Scarfone , K. and Romanosky , S. , ( 2007 ). A Complete Guide to the Common Vulnerability Scoring System Version 2.0. Availabale t: http:\/\/www.nazimkaradag.com\/wp-content\/uploads\/2014\/11\/cvss-guide.pdf [Accessed 25th Feb, 2017] Mell, P., Scarfone, K. and Romanosky, S., (2007). A Complete Guide to the Common Vulnerability Scoring System Version 2.0. Availabale t: http:\/\/www.nazimkaradag.com\/wp-content\/uploads\/2014\/11\/cvss-guide.pdf [Accessed 25th Feb, 2017]"},{"key":"e_1_3_2_1_23_1","volume-title":"Networks & Soft Computing (ICNSC), 2014 First International Conference on (pp. 273--277)","author":"Spoorthi V.","year":"2014","unstructured":"Spoorthi , V. , & Sekaran , K. C. ( 2014 , August). Mobile single sign-on solution for enterprise cloud applications . In Networks & Soft Computing (ICNSC), 2014 First International Conference on (pp. 273--277) . IEEE. Spoorthi, V., & Sekaran, K. C. (2014, August). Mobile single sign-on solution for enterprise cloud applications. In Networks & Soft Computing (ICNSC), 2014 First International Conference on (pp. 273--277). IEEE."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICC.2013.6805850"},{"key":"e_1_3_2_1_25_1","volume-title":"Internet Technology and Secured Transactions, 2012 International Conference for (pp. 150--155)","author":"Zwattendorfer B.","year":"2012","unstructured":"Zwattendorfer , B. , & Tauber , A. ( 2012 ). Secure cross-cloud single sign-on (SSO) using eIDs . In Internet Technology and Secured Transactions, 2012 International Conference for (pp. 150--155) . IEEE. Zwattendorfer, B., & Tauber, A. (2012). Secure cross-cloud single sign-on (SSO) using eIDs. In Internet Technology and Secured Transactions, 2012 International Conference for (pp. 150--155). IEEE."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/NUiConE.2011.6153227"},{"key":"e_1_3_2_1_27_1","volume-title":"Electrotechnical Conference (MELECON)","author":"Abdo J. B.","year":"2014","unstructured":"Abdo , J. B. , Demerjian , J. , Chaouchi , H. , Barbar , K. , & Pujolle , G. ( 2014 , April). Single-sign-on in operator centric mobile cloud architecture . In Electrotechnical Conference (MELECON) , 2014 17th IEEE Mediterranean (pp. 151--155). IEEE. Abdo, J. B., Demerjian, J., Chaouchi, H., Barbar, K., & Pujolle, G. (2014, April). Single-sign-on in operator centric mobile cloud architecture. In Electrotechnical Conference (MELECON), 2014 17th IEEE Mediterranean (pp. 151--155). IEEE."},{"key":"e_1_3_2_1_28_1","volume-title":"SuSSo: seamless and ubiquitous single sign-on for cloud service continuity across devices","author":"Cabarcos P. A.","year":"2012","unstructured":"Cabarcos , P. A. , Mendoza , F. A. , Guerrero , R. S. , Lopez , A. M. , & Diaz-Sanchez , D. ( 2012 ). SuSSo: seamless and ubiquitous single sign-on for cloud service continuity across devices . IEEE Transactions on Consumer Electronics , 58(4), 1425--1433. Cabarcos, P. A., Mendoza, F. A., Guerrero, R. S., Lopez, A. M., & Diaz-Sanchez, D. (2012). SuSSo: seamless and ubiquitous single sign-on for cloud service continuity across devices. IEEE Transactions on Consumer Electronics, 58(4), 1425--1433."},{"key":"e_1_3_2_1_29_1","volume-title":"Classification and Assessment of Computer Network Threats and Vulnerabilities. In 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD) (pp. 1--10)","author":"Kebande V. R.","year":"2018","unstructured":"Kebande , V. R. , Kigwana , I. , Venter , H. S. , Karie , N. M. , & Wario , R. D. ( 2018 , August). CVSS Metric-Based Analysis , Classification and Assessment of Computer Network Threats and Vulnerabilities. In 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD) (pp. 1--10) . IEEE. Kebande, V. R., Kigwana, I., Venter, H. S., Karie, N. M., & Wario, R. D. (2018, August). CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities. In 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD) (pp. 1--10). IEEE."}],"event":{"name":"NISS2020: The 3rd International Conference on Networking, Information Systems & Security","acronym":"NISS2020","location":"Marrakech Morocco"},"container-title":["Proceedings of the 3rd International Conference on Networking, Information Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386723.3387875","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386723.3387875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:19Z","timestamp":1750199899000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386723.3387875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,31]]},"references-count":29,"alternative-id":["10.1145\/3386723.3387875","10.1145\/3386723"],"URL":"https:\/\/doi.org\/10.1145\/3386723.3387875","relation":{},"subject":[],"published":{"date-parts":[[2020,3,31]]},"assertion":[{"value":"2020-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}