Authentication Proxy as a Service

被引:0
|
作者
Abdo, Jacques Bou [1 ]
机构
[1] Notre Dame Univ, Fac Nat & Appl Sci, Deir El Qamar, Lebanon
关键词
mobile cloud computing; LTE; authentication and key agreement; single-sign-on; proxy certificate;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
5G, fog computing and the majority of the latest technological trends have minimized latency as a top priority. These initiatives are focusing on physical layer methods to decrease latency, thus keeping the changes transparent to users. Physical layer changes are expensive and in many cases incompatible with the original solution which results in lower adoption rate and higher capital investment. In this paper, we propose a transport/ application layer method to decrease latency in mobile cloud environments.
引用
收藏
页码:45 / 49
页数:5
相关论文
共 50 条
  • [31] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 345 - +
  • [32] Message Authentication Scheme for VANET Based on Proxy Re-Signature
    Yang, Xiaodong
    An, Faying
    Yang, Ping
    Wu, Xiaobo
    Li, Yutong
    Xiao, Likun
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [33] MINCO A Novel Authentication Scheme based on Pre-Authentication Service
    Kadhem, Hasan
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 586 - 594
  • [34] Efficient distributed authentication method with local proxy for Wireless Mesh Networks
    Lee, Insun
    Lee, Jihoon
    Kirn, Daeyoung
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3556 - +
  • [35] A traffic analysis of authentication methods for proxy mobile IPv6
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 512 - 517
  • [36] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 412 - 415
  • [37] An authentication method for proxy mobile IPv6 and performance analysis
    Zhou, Huachun
    Zhang, Hongke
    Qin, Yajuan
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (05) : 445 - 454
  • [38] A Dynamic Proxy for Lightweight Web Service Composition
    Najam, Sara
    Dinkelaker, Tom
    Erradi, Mohamed
    Ouzzif, Mohamed
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 699 - 704
  • [39] Algorithms of Authentication and Authorization by Proxy in Distributed Information-Computing Environment
    Demidov, Alexander
    Polovinkin, Daniil
    Potlova, Tatyana
    Shateev, Roman
    Sopina, Eugenia
    2017 11TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT 2017), 2017, : 303 - 307
  • [40] Adaptive multimedia stream service with intelligent proxy
    Nam, DH
    Park, SK
    15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS, 2001, : 291 - 296