Securing Cloud-Based Applications, Part 1. Margulies, J. IEEE Security & Privacy, 13(5):96-98, IEEE, 9, 2015.
Securing Cloud-Based Applications, Part 1 [link]Website  abstract   bibtex   
In the first article of a series on building software as a service (SaaS) applications with security in mind, the author discusses best practices for user authentication, including cloud-based authentication services, key derivation functions, and two-factor authentication options.
@article{
 title = {Securing Cloud-Based Applications, Part 1},
 type = {article},
 year = {2015},
 identifiers = {[object Object]},
 keywords = {authentication,cloud,security},
 pages = {96-98},
 volume = {13},
 websites = {http://dx.doi.org/10.1109/msp.2015.117},
 month = {9},
 publisher = {IEEE},
 institution = {Qmulos},
 id = {3bd090fc-8945-32e1-997b-db75b9faa862},
 created = {2018-07-12T21:31:26.932Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:31:26.932Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {margulies:cloud1},
 source_type = {article},
 private_publication = {false},
 abstract = {In the first article of a series on building software as a service (SaaS) applications with security in mind, the author discusses best practices for user authentication, including cloud-based authentication services, key derivation functions, and two-factor authentication options.},
 bibtype = {article},
 author = {Margulies, Jonathan},
 journal = {IEEE Security & Privacy},
 number = {5}
}

Downloads: 0