Authentication Proxy as a Service

被引:0
|
作者
Abdo, Jacques Bou [1 ]
机构
[1] Notre Dame Univ, Fac Nat & Appl Sci, Deir El Qamar, Lebanon
关键词
mobile cloud computing; LTE; authentication and key agreement; single-sign-on; proxy certificate;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
5G, fog computing and the majority of the latest technological trends have minimized latency as a top priority. These initiatives are focusing on physical layer methods to decrease latency, thus keeping the changes transparent to users. Physical layer changes are expensive and in many cases incompatible with the original solution which results in lower adoption rate and higher capital investment. In this paper, we propose a transport/ application layer method to decrease latency in mobile cloud environments.
引用
收藏
页码:45 / 49
页数:5
相关论文
共 50 条
  • [1] Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
    Hwang, Doo-Hee
    Shin, Jin-Myeong
    Choi, Yoon-Ho
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 694 - 696
  • [2] Research of ID authentication based on proxy ARP
    Wang, Bin
    Li, Wei
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (24): : 231 - 232
  • [3] Mutual authentication scheme in Proxy Mobile IP
    Mun, Younsong
    Kim, Miyoung
    Kim, GyeYoung
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCES AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 65 - +
  • [4] The GridSite proxy delegation service
    McNab, Andrew
    Kaushal, Shiv
    PROCEEDINGS OF THE UK E-SCIENCE ALL HANDS MEETING 2006, 2006, : 349 - +
  • [5] Design and implementation of web forward proxy with Shibboleth authentication
    Komura, Takaaki
    Sano, Hiroaki
    Demizu, Noritoshi
    Makimura, Ken
    Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011, 2011, : 321 - 326
  • [6] HPBS: A Hybrid Proxy Based Authentication Scheme in VANETs
    Liu, Hua
    Wang, Haijiang
    Gu, Huixian
    IEEE ACCESS, 2020, 8 : 161655 - 161667
  • [7] Research on Authentication Technology Based on Proxy in Mobile Learning
    Li, Fengying
    Xu, Jianping
    Xue, Qingshui
    INTERNATIONAL SYMPOSIUM MODERN EDUCATION AND HUMAN SCIENCES (MEHS 2014), 2014, : 384 - 389
  • [8] An anonymous wireless authentication protocol based on proxy signature
    Jiang, Chunlin
    Jia, Weijia
    Gu, Ke
    Journal of Computational Information Systems, 2012, 8 (02): : 541 - 548
  • [9] IdP proxy for combined authentication based on multiple IdPs
    Kaji, Tadashi
    Fujishiro, Takahiro
    Irube, Shinichi
    2010 IEEE 4TH INTERNATIONAL SYMPOSIUM ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (ANTS), 2010, : 34 - 36
  • [10] Finding service paths in a media service proxy network
    Xu, DY
    Nahrstedt, K
    MULTIMEDIA COMPUTING AND NETWORKING 2002, 2002, 4673 : 171 - 185