Expert Knowledge-Based Authentication Protocols for Cloud Computing Applications

被引:1
|
作者
Ogiela, Marek R. [1 ]
Ogiela, Lidia [2 ]
机构
[1] AGH Univ Sci & Technol, 30 Mickiewicza Ave, PL-30059 Krakow, Poland
[2] Pedag Univ Cracow, Inst Comp Sci, Podchorazych 2 St, PL-30084 Krakow, Poland
关键词
Cryptographic protocols; User authentication; Cloud and fog computing; Cognitive CAPTCHA;
D O I
10.1007/978-3-319-98557-2_8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper will be presented new classes of authentication procedures, based on visual CAPTCHA solutions, which require special cognitive skills or expert-knowledge. Such authentication protocols can be used especially to differentiate access possibilities for particular group of persons, based of theirs expertise. For new authentication protocols some possible examples of applications will be presented with relation to Cloud computing and distributed authentication.
引用
收藏
页码:82 / 87
页数:6
相关论文
共 50 条
  • [1] Knowledge-Based Automated Repair of Authentication Protocols
    Bonakdarpour, Borzoo
    Hajisheykhi, Reza
    Kulkarni, Sandeep S.
    [J]. FM 2014: FORMAL METHODS, 2014, 8442 : 132 - 147
  • [2] Industrial applications of knowledge-based expert systems
    Batanov, DN
    [J]. COMPUTERS IN INDUSTRY, 1998, 37 (02) : 83 - 85
  • [3] Applications of Knowledge-Based Expert Systems to Feng Shui Knowledge
    Mak, Michael Y.
    [J]. INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 59 - 64
  • [4] KNOWLEDGE-BASED (EXPERT) SYSTEMS IN ENGINEERING APPLICATIONS - A SURVEY
    VALAVANIS, KP
    KOKKINAKI, AI
    TZAFESTAS, SG
    [J]. JOURNAL OF INTELLIGENT & ROBOTIC SYSTEMS, 1994, 10 (02) : 113 - 145
  • [5] Knowledge-based adaptable scheduler for SaaS providers in cloud computing
    Motavaselalhagh, Farzaneh
    Esfahani, Faramarz Safi
    Arabnia, Hamid Reza
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2015, 5
  • [6] Knowledge-Based Expressive Technologies Within Cloud Computing Environments
    Kovalchuk, Sergey V.
    Smirnov, Pavel A.
    Knyazkov, Konstantin V.
    Zagarskikh, Alexander S.
    Boukhanovsky, Alexander V.
    [J]. PRACTICAL APPLICATIONS OF INTELLIGENT SYSTEMS, ISKE 2013, 2014, 279 : 1 - 11
  • [7] KNOWLEDGE-BASED EXPERT SYSTEMS
    HAYESROTH, F
    [J]. COMPUTER, 1984, 17 (10) : 263 - 273
  • [8] Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
    Siddiqui, Zeeshan
    Tayan, Omar
    Khan, Muhammad Khurram
    [J]. IEEE ACCESS, 2018, 6 : 34527 - 34542
  • [9] Bayesian networks for knowledge-based authentication
    Chen, Ye
    Liginlal, Divakaran
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (05) : 695 - 710
  • [10] KNOWLEDGE-BASED EXPERT SYSTEM APPLICATIONS IN WASTE TREATMENT OPERATION AND CONTROL
    BARNETT, MW
    [J]. ISA TRANSACTIONS, 1992, 31 (01) : 53 - 60