Authentication Proxy as a Service

被引:0
|
作者
Abdo, Jacques Bou [1 ]
机构
[1] Notre Dame Univ, Fac Nat & Appl Sci, Deir El Qamar, Lebanon
关键词
mobile cloud computing; LTE; authentication and key agreement; single-sign-on; proxy certificate;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
5G, fog computing and the majority of the latest technological trends have minimized latency as a top priority. These initiatives are focusing on physical layer methods to decrease latency, thus keeping the changes transparent to users. Physical layer changes are expensive and in many cases incompatible with the original solution which results in lower adoption rate and higher capital investment. In this paper, we propose a transport/ application layer method to decrease latency in mobile cloud environments.
引用
收藏
页码:45 / 49
页数:5
相关论文
共 50 条
  • [21] A short proxy signature scheme: Efficient authentication in the ubiquitous world
    Huang, XY
    Mu, Y
    Susilo, W
    Zhang, FG
    Chen, XF
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 480 - 489
  • [22] Re-engineering of Web Reverse Proxy with Shibboleth Authentication
    Haron, Galoh Rashidah
    Maniam, Dharmadharshni
    Sadasivam, Ayakumari
    Loon, Wong Hon
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 325 - 330
  • [23] AUTHENTICATION IN MULTI-TIER SYSTEMS USING PROXY SIGNATURES
    Pautov, P. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2010, 10 (04): : 18 - +
  • [24] Performace Analysis of authentication method for Proxy Mobile IP protocol
    Tie Ling
    He Di
    Li Jian Hua
    Tang Jun Hua
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 2048 - 2051
  • [25] An Authentication Client Proxy Mechanism for Resource-Constrained Devices
    Ohba, Yoshihiro
    Kanda, Mitsuru
    2012 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2012,
  • [26] Lightweight mutual authentication based on proxy certificate trust list
    Xin, L
    Ogawa, M
    PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 628 - 632
  • [27] A proxy service for the xrootd data server
    Hanushevsky, A
    Stockinger, H
    SCIENTIFIC APPLICATIONS OF GRID COMPUTING, 2004, 3458 : 38 - 49
  • [28] CUIAS - A User Identity Authentication Service for Discovery Service
    Liu, Peng
    Kong, Ning
    Tian, Ye
    Lee, Xiaodong
    Yan, Baoping
    2014 IEEE INTERNATIONAL CONFERENCE (ITHINGS) - 2014 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) - 2014 IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL-SOCIAL COMPUTING (CPS), 2014, : 95 - 101
  • [29] A service bundle authentication mechanism in the OSGi service platform
    Kim, YG
    Moon, CJ
    Park, DH
    Baik, DK
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1 (LONG PAPERS), PROCEEDINGS, 2004, : 420 - 425
  • [30] Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
    Liu, Yiliang
    Wang, Liangmin
    Chen, Hsiao-Hwa
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (08) : 3697 - 3710