Securing Cloud-Based Applications, Part 1. Margulies, J. IEEE Security & Privacy, 13(5):96-98, IEEE, 9, 2015.
Website abstract bibtex In the first article of a series on building software as a service (SaaS) applications with security in mind, the author discusses best practices for user authentication, including cloud-based authentication services, key derivation functions, and two-factor authentication options.
@article{
title = {Securing Cloud-Based Applications, Part 1},
type = {article},
year = {2015},
identifiers = {[object Object]},
keywords = {authentication,cloud,security},
pages = {96-98},
volume = {13},
websites = {http://dx.doi.org/10.1109/msp.2015.117},
month = {9},
publisher = {IEEE},
institution = {Qmulos},
id = {3bd090fc-8945-32e1-997b-db75b9faa862},
created = {2018-07-12T21:31:26.932Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:26.932Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {margulies:cloud1},
source_type = {article},
private_publication = {false},
abstract = {In the first article of a series on building software as a service (SaaS) applications with security in mind, the author discusses best practices for user authentication, including cloud-based authentication services, key derivation functions, and two-factor authentication options.},
bibtype = {article},
author = {Margulies, Jonathan},
journal = {IEEE Security & Privacy},
number = {5}
}