Now showing items 1-2 of 2

    • Authentication and Authorization for Mobile Devices 

      Ranjbar, Navid; Mahdi, Abdinejadi (2012-08-06)
      Nowadays market demand forces companies to adapt to mobile technology. For an enterprise company, this change will bring up security challenges. In this article, we investigate authentication and authorization aspects ...
    • Cloud Services Provider 

      Yuan, Xu (2011-02-21)
      Context: Cloud computing as next generation computing paradigm has been accepted widely with growing-up of Internet technology and success of World Wide Web, which has the potential to transform a large part of IT industry, ...