Searched for: "authentication as a service"
- Security (359)
- Cloud (123)
- Mobility (109)
- Networking (61)
- Data Management (27)
- Software (22)
- Data Centers (15)
- Hardware (14)
- Microsoft (14)
- Enterprise Software (12)
- Big Data (9)
- Open Source (8)
- Developer (7)
- Collaboration (6)
- Cxo (6)
- Project Management (4)
- Storage (3)
- E-Commerce (2)
- Start-Ups (2)
- After Hours (1)
- Banking (1)
- Google (1)
- Innovation (1)
- Social Enterprise (1)
- Virtualization (1)
About 812 results for "authentication as a service"
This year will prove to be a key year for IoT and wearables as they pair together to revolutionize the enterprise and consumer markets with unprecedented growth.
Interest in Web services is rapidly increased from their start of use. To exchange information among the application in standard way is the main goal of web services. This communic...
In a mobile environment, a number of users act as a network nodes and communicate with one another to acquire location based information and services. This emerging paradigm has op...
There are different types of attacks on cloud by intruders or outsiders. They are classified as denial of service attacks, cloud malware injection attacks, side channel attacks, au...
When an oversized variety of beacons arrive in a very short time, vehicles are at risk of computation-based denial of service attacks that excessive signature verification exhausts...
Cloud computing technology is widely used so the data can be outsourced on cloud can be accessed easily. Different users can share the data through different virtual machines, the ...
Wireless Mesh Networks (WMNs) have recently attracted increasing attention and deployment as a promising low-cost approach to provide last-mile high-speed Internet access at metrop...
A Survey-Decentralized Access Control with Anonymous Authentication and Deduplication of Data Stored in Clouds
Cloud computing is a rising computing standard in which assets of the computing framework are given as a service over the Internet. It delivers new challenges for data security and...
As an emerging technology and business paradigm, cloud computing platforms provide easy access to a company's high-performance, computing and storage infrastructure through web ser...
Recent advancements in technology, tiny size and cost effectiveness have made sensors as a crucial part of real world sensitive applications. Many Denial of Service (DoS) attacks a...