|
[1]S. Barber, “How Fast Does a Website Need to Be,” PertTestPlus Inc. in Florida, 2007. [2]J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes,” University of Cambridge, Computer Laboratory, Tech. Rep. 817, March 2012. [3]B. Chess and B. Arkin, “The Case for Mobile Two-Factor Authentication. Security & Privacy”, IEEE Security & Privacy, Vol. 9, No. 5, pp. 81-85, 2011. [4]F. Chong, G. Carraro, and R. Wolter, “Multi-Tenant Data Architecture,” in MSDN Library, Microsoft Corp., Jun. 2006. [5]R. J. Creasy, “The Origin of the VM/370 Time-Sharing System,” IBM Journal of Research and Development, Vol. 25, No. 5, pp. 483-490, 1981. [6]W. Gerlach, Wei Tang, K. Keegan, T. Harrison, A. Wilke, J. Bischof, M. D’Souza, S. Devoid, D. Murphy-Olson, N. Desai and F. Meyer, “Container-based Execution Environment Management for Multi-cloud Scientific Workflows,” In Proceedings of the 5th International Workshop on Data-Intensive Computing in the Clouds, pp. 25-32, Nov. 2014. [7]E. Haselsteiner and K. Breitfuß, “Security in Near Field Communication (NFC): Strengths and Weaknesses,” In Proceedings of Workshop on RFID Security, pp. 1-10, 2006. [8]Zheng-Qin Jian, Yu-Chung Huang, Jehn-Ruey Jiang, “A Privacy Preserving NFC Guestbook System,” M.S. Thesis, National Central University, 2015. [9]R. Krebs, “Architectural Concerns in Multi-tenant SaaS Applications,” In Proceedings of the 2nd International Conference on Cloud Computing and Services Science, 2012. [10]Haw Lee, Wei-Chih Hong, Chia-Hung Kao and Chen-Mou Cheng, “A User-friendly Authentication Solution using NFC,” In Proceedings of 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 271-278, 2014. [11]Xiao-Yong Li, Yong Shi, Yu Guo, Wei Ma, “Multi-Tenancy Based Access Control in Cloud,” In Proceedings of 2010 International Conference on Computational Intelligence and Software Engineering (CiSE), 2010. [12]D. Linthicum, “The Silly Debate over Multitenancy,” InfoWorld Corp., 9 Apr. 2010. [13]C. Lu, A. L. M. Santos, F. R. Pimentel, “Implementation of Fast RSA Key Generation on Smart Cards” In Proceedings of the 2002 ACM Symposium on Applied Computing, pp. 214-220, 2002. [14]J. D. Meier, A. Mackman, M. Dunner, S. Vasireddy, R. and A. Murukan, “Improving Web Application Security: Threats and Countermeasures,” In Security Guidance for Applications, Microsoft Corp., Jun. 2003. [15]Peter Mell, Timothy Grance, “The NIST Definition of Cloud Computing,” National Institute of Standards and Technology, Special Publication 800-145. [16]S. A. Mokhtar, S. H. S. Ali, A. Al-Sharafi, A. Aborujilah, “Cloud Computing in Academic Institutions,” In Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013. [17]R. Morris and K. Thompson, “Password Security: a Case History,” Communications of the ACM, Vol. 22, pp. 594-597, Nov. 1979. [18]C. Pahl, “Containerisation and the PaaS Cloud,” IEEE Cloud Computing Magazine, pp. 24-31, 6 May 2015. [19]A. Regalado, “Who Coined ‘Cloud Computing’?,” MIT Technology Review, 31 Oct. 2011. [20]D. Rinner, H. Witschnig, E. Merlin, “Broadband NFC - A System Analysis for the Uplink,” Information Forensics and Security, pp. 292-296, 2009. [21]R. Rivest, A. Shamir, L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems” Communications of the ACM 21, pp. 120-126, 1978. [22]A. Slominski, V. Muthusamy and R. Khalaf, “Building a Multi-tenant Cloud Service from Legacy Code with Docker Containers,” In Proceedings of 2015 IEEE International Conference on Cloud Engineering(IC2E), Mar. 2015. [23]B. Stone, “Monday Morning Madness,” Twitter Inc. 5 Jan. 2009. [24]S. Thurm, “Apple’s iCloud Service Is Under Attack in Mainland China,” The Wall Street Journal, 21 Oct. 2014. [25]K.P. Weiss, “Method and apparatus for positively identifying an individual,” U.S. 6 676 626, US4720860 A, 19 Jan. 1988. [26]B. Wilder, “Multitenancy and Commodify Hadware Primer,” In Cloud Architecture Patterns: Using Microsoft Azure, O'Reilly Media, Inc., 2015, Ch. 8, Sec. 1, pp. 77-78. [27]K. Zetter, “Weak Password Brings ‘Happiness’ to Twitter Hacker,” Wired Corp., 1 Jun. 2009. [28]Consultancy.uk, http://consultancy.uk/ [29]Docker, https://www.docker.com/ [30]Google 2-steps verification, https://developers.google.com/identity/ [31]NFC-Forum, http://nfc-forum.org/ [32]RSA SecurID, https://www.rsa.com/ [33]VMware, http://www.vmware.com/
|