{"id":"https://openalex.org/W2113987044","doi":"https://doi.org/10.4304/jnw.9.01.198-203","title":"Security Analysis and Improvement of User Authentication Framework for Cloud Computing","display_name":"Security Analysis and Improvement of User Authentication Framework for Cloud Computing","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2113987044","doi":"https://doi.org/10.4304/jnw.9.01.198-203","mag":"2113987044"},"language":"en","primary_location":{"id":"doi:10.4304/jnw.9.01.198-203","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.9.01.198-203","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100442858","display_name":"Nan Chen","orcid":"https://orcid.org/0000-0002-8730-2575"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nan Chen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5101824455","display_name":"Rui Jiang","orcid":"https://orcid.org/0000-0002-8788-515X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rui Jiang","raw_affiliation_strings":["(Southeast University)"],"affiliations":[{"raw_affiliation_string":"(Southeast University)","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100442858"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":9.4668,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.97656802,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9392107129096985},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6764105558395386},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5225702524185181},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4587327539920807},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43845927715301514},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.41728076338768005},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17776557803153992}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9392107129096985},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6764105558395386},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5225702524185181},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4587327539920807},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43845927715301514},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.41728076338768005},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17776557803153992}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jnw.9.01.198-203","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.9.01.198-203","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1596740724","https://openalex.org/W1975009369","https://openalex.org/W2036892464","https://openalex.org/W2048887528","https://openalex.org/W2052921332","https://openalex.org/W2061508551","https://openalex.org/W2067247224","https://openalex.org/W2073321339","https://openalex.org/W2081713029","https://openalex.org/W2093243364","https://openalex.org/W2114296561","https://openalex.org/W2149336128"],"related_works":["https://openalex.org/W4385451301","https://openalex.org/W2523967339","https://openalex.org/W2182804944","https://openalex.org/W2125615450","https://openalex.org/W4230987454","https://openalex.org/W2915516796","https://openalex.org/W2614778841","https://openalex.org/W65919655","https://openalex.org/W2992381278","https://openalex.org/W4385451241"],"abstract_inverted_index":{"Cloud":[0],"Computing,":[1],"as":[2],"an":[3,61],"emerging,":[4],"virtual,":[5],"large-scale":[6],"distributed":[7],"computing":[8,40],"model,":[9],"has":[10],"gained":[11],"increasing":[12],"attention":[13],"these":[14],"years.":[15],"Meanwhile":[16],"it":[17],"also":[18],"faces":[19],"many":[20],"secure":[21],"challenges,":[22],"one":[23],"of":[24,83,107],"which":[25],"is":[26,110],"authentication.":[27],"In":[28],"this":[29],"paper,":[30],"we":[31,59],"firstly":[32],"analyze":[33],"a":[34],"user":[35,63,70],"authentication":[36,64,82,97],"framework":[37],"for":[38],"cloud":[39],"proposed":[41],"by":[42,89],"Amlan":[43],"Jyoti":[44],"Choudhury":[45],"et":[46],"al":[47],"and":[48,79,95],"point":[49],"out":[50],"the":[51,56,75,80,90,96,104],"security":[52],"attacks":[53],"existing":[54],"in":[55],"protocol.":[57],"Then":[58],"propose":[60],"improved":[62,67],"scheme.":[65],"Our":[66],"protocol":[68,85],"ensures":[69],"legitimacy":[71],"before":[72],"entering":[73],"into":[74],"cloud.":[76],"The":[77,100],"confidentiality":[78],"mutual":[81],"our":[84,108],"are":[86],"formally":[87],"proved":[88],"strand":[91],"space":[92],"model":[93],"theory":[94],"test":[98],"method.":[99],"simulation":[101],"illustrates":[102],"that":[103],"communication":[105],"performance":[106],"scheme":[109],"efficient":[111]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
