The algorithm secure authentication when using cloud computing

Бесплатный доступ

In the article the aspects of information security in the use of technologies of cloud computing, revealed the vulnerability of the client connection and proposed a new algorithm for secure authentication.

Cloud computing, the vulnerability of the client, mutual authentication, secure authentication, "kerberos", vpn

Короткий адрес: https://sciup.org/140191656

IDR: 140191656

Статья научная