Zarif Khudoykulov, Abdukodir Karimov, R. Abdurakhmanov, Mirkomil Mirzabekov
{"title":"云计算中的身份验证:开放问题","authors":"Zarif Khudoykulov, Abdukodir Karimov, R. Abdurakhmanov, Mirkomil Mirzabekov","doi":"10.1109/ICESC57686.2023.10193438","DOIUrl":null,"url":null,"abstract":"An authentication mechanism plays an essential role in access control. Authentication methods vary depending on the environment used, and many authentication methods are designed for cloud computing systems. This research paper examines the current authentication techniques employed in cloud computing systems and highlights unresolved issues and challenges that exist in this domain.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Authentication in Cloud Computing: Open Problems\",\"authors\":\"Zarif Khudoykulov, Abdukodir Karimov, R. Abdurakhmanov, Mirkomil Mirzabekov\",\"doi\":\"10.1109/ICESC57686.2023.10193438\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An authentication mechanism plays an essential role in access control. Authentication methods vary depending on the environment used, and many authentication methods are designed for cloud computing systems. This research paper examines the current authentication techniques employed in cloud computing systems and highlights unresolved issues and challenges that exist in this domain.\",\"PeriodicalId\":235381,\"journal\":{\"name\":\"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICESC57686.2023.10193438\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICESC57686.2023.10193438","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An authentication mechanism plays an essential role in access control. Authentication methods vary depending on the environment used, and many authentication methods are designed for cloud computing systems. This research paper examines the current authentication techniques employed in cloud computing systems and highlights unresolved issues and challenges that exist in this domain.