Securing Cloud-Based Applications, Part 1. Margulies, J. IEEE Security & Privacy, 13(5):96-98, IEEE, 9, 2015. Website abstract bibtex In the first article of a series on building software as a service (SaaS) applications with security in mind, the author discusses best practices for user authentication, including cloud-based authentication services, key derivation functions, and two-factor authentication options.
@article{
title = {Securing Cloud-Based Applications, Part 1},
type = {article},
year = {2015},
identifiers = {[object Object]},
keywords = {authentication,cloud,security},
pages = {96-98},
volume = {13},
websites = {http://dx.doi.org/10.1109/msp.2015.117},
month = {9},
publisher = {IEEE},
institution = {Qmulos},
id = {3bd090fc-8945-32e1-997b-db75b9faa862},
created = {2018-07-12T21:31:26.932Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:26.932Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {margulies:cloud1},
source_type = {article},
private_publication = {false},
abstract = {In the first article of a series on building software as a service (SaaS) applications with security in mind, the author discusses best practices for user authentication, including cloud-based authentication services, key derivation functions, and two-factor authentication options.},
bibtype = {article},
author = {Margulies, Jonathan},
journal = {IEEE Security & Privacy},
number = {5}
}
Downloads: 0
{"_id":"5fH3i4pdzKyBxYqMh","bibbaseid":"margulies-securingcloudbasedapplicationspart1-2015","downloads":0,"creationDate":"2019-02-15T15:14:59.087Z","title":"Securing Cloud-Based Applications, Part 1","author_short":["Margulies, J."],"year":2015,"bibtype":"article","biburl":null,"bibdata":{"title":"Securing Cloud-Based Applications, Part 1","type":"article","year":"2015","identifiers":"[object Object]","keywords":"authentication,cloud,security","pages":"96-98","volume":"13","websites":"http://dx.doi.org/10.1109/msp.2015.117","month":"9","publisher":"IEEE","institution":"Qmulos","id":"3bd090fc-8945-32e1-997b-db75b9faa862","created":"2018-07-12T21:31:26.932Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:26.932Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"margulies:cloud1","source_type":"article","private_publication":false,"abstract":"In the first article of a series on building software as a service (SaaS) applications with security in mind, the author discusses best practices for user authentication, including cloud-based authentication services, key derivation functions, and two-factor authentication options.","bibtype":"article","author":"Margulies, Jonathan","journal":"IEEE Security & Privacy","number":"5","bibtex":"@article{\n title = {Securing Cloud-Based Applications, Part 1},\n type = {article},\n year = {2015},\n identifiers = {[object Object]},\n keywords = {authentication,cloud,security},\n pages = {96-98},\n volume = {13},\n websites = {http://dx.doi.org/10.1109/msp.2015.117},\n month = {9},\n publisher = {IEEE},\n institution = {Qmulos},\n id = {3bd090fc-8945-32e1-997b-db75b9faa862},\n created = {2018-07-12T21:31:26.932Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:26.932Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {margulies:cloud1},\n source_type = {article},\n private_publication = {false},\n abstract = {In the first article of a series on building software as a service (SaaS) applications with security in mind, the author discusses best practices for user authentication, including cloud-based authentication services, key derivation functions, and two-factor authentication options.},\n bibtype = {article},\n author = {Margulies, Jonathan},\n journal = {IEEE Security & Privacy},\n number = {5}\n}","author_short":["Margulies, J."],"urls":{"Website":"http://dx.doi.org/10.1109/msp.2015.117"},"bibbaseid":"margulies-securingcloudbasedapplicationspart1-2015","role":"author","keyword":["authentication","cloud","security"],"downloads":0},"search_terms":["securing","cloud","based","applications","part","margulies"],"keywords":["authentication","cloud","security"],"authorIDs":[]}