ACM Transactions on Information and System Security (TISSEC)
Dynamic Virtual Private Networks
Dynamic Virtual Private Networks
ID-based password authentication scheme using smart cards and fingerprints
ACM SIGOPS Operating Systems Review
Computer Security in the Real World
Computer
Paranoid penguin: two-factor authentication
Linux Journal
Privacy preserving multi-factor authentication with biometrics
Proceedings of the second ACM workshop on Digital identity management
Implementing internet key exchange (IKE)
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
A Secure Routing Protocol for Wireless Embedded Networks
RTCSA '08 Proceedings of the 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
Secure cloud computing with a virtualized network infrastructure
HotCloud'10 Proceedings of the 2nd USENIX conference on Hot topics in cloud computing
Password based remote authentication scheme using ECC for smart card
Proceedings of the 2011 International Conference on Communication, Computing & Security
Eliminating the hypervisor attack surface for a more secure cloud
Proceedings of the 18th ACM conference on Computer and communications security
SECaaS: security as a service for cloud-based applications
Proceedings of the Second Kuwait Conference on e-Services and e-Systems
A Dynamic VPN Architecture for Private Cloud Computing
UCC '11 Proceedings of the 2011 Fourth IEEE International Conference on Utility and Cloud Computing
Design and implementation of SIP security
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Getting web authentication right: a best-case protocol for the remaining life of passwords
SP'11 Proceedings of the 19th international conference on Security Protocols
Hi-index | 0.00 |
A private cloud provides organizations a secure environment to run business process. It provides a flexible way to extend the working environment. While user mobility has become an important feature for many systems, technologies that provide users a lower cost and flexible way in joining a secure private cloud are in a strong demand. This paper exploits the extension of IPSec to have secured tunnels with private cloud for users who might move around dynamically without carrying the same machine. A strong authentication with a key agreement scheme is proposed to establish the secure tunnel. Besides, several related security properties of the proposed mechanism are presented.