Authentication

Learn about authentication, we have the largest and most updated authentication information on alibabacloud.com

Research on application of grid file storage in cloud computing environment

Research on the application of grid file storage in cloud computing environment Liu Youan, Roming the grid storage hierarchy and designed the prototype of network file storage System, aiming at the growing problem of massive file data management in Internet application. This paper compares the similarities and differences of cloud storage and network storage, designs the data storage process of grid file based on security authentication, uses name service to solve the problem of unified view of grid file, and uses redundant storage strategy to solve the problem of data storage reliability. Compared with traditional data center mode storage structure, the new system has higher availability. This storage application can be used for data management in energy power systems and ...

Research and implementation of cloud computing security technology based on HDFs

Research and implementation of cloud computing security technology based on HDFs the Guo San Changbenwen innovation of Guangdong University of Technology is as follows: (1) based on the principle of Ibe algorithm, the Datanode authentication security mechanism of client access under HDFs is designed, In order to make up the original HDFS architecture under the client Access Datanode has not been certified defects, so that malicious or counterfeit users can not go through the main server Namenode to steal the private data on the Datanode to ensure data security. At the same time, using the principle of class Ibe algorithm,...

Cloud computing trends: governance gateways and security

Cloud computing has many benefits, but there are also a number of unwelcome "peers" accompanying them. They are governance issues, authentication gateways (whether or not they are used), and security issues. Although these issues are similar to cross-cutting it areas, they are not exactly the same. True, SOA governance is the first step in transformational cloud governance, says Joe McKendrick of the Joe McKendrick Institute, which spans multiple platforms and system access services as the fundamental challenge of cloud computing. "In the cloud, a service may be called by an application, and the application is ...

Oath Toolkit 1.12.0 Release Development Kit

Oath Toolkit is a tool for developing Open authentication (oath)-related deployment technologies. It contains a shared library, command-line tools, and a PAM module that allows it to generate a one-time password authentication system. Support for event-based HOTP and time based TOTP one-time password settings. The oath is an algorithm specified by an open certification authority. Oath Toolkit 1.12.0 This version adds Oathtool--base32 parameters to decode BAS ...

Aletheia 0.0.7 Publish Send HTTP Requestor

Aletheia is a browser-like application that sends the original HTTP request, which is written in Java and is used primarily for debugging and locating security issues in Web applications. It can apply filters in each request and response to modify content such as Basic authentication or http://www.aliyun.com/zixun/aggregation/13376.html ">oauth requests." You can set custom cookies or user proxies through it, or send text ...

Phpmyaccess Alpha 2.0 publishes a complete user system and menu system

Phpmyaccess is based on Phpmyedit to improve, including a complete user system and menu system, the main feature is simple installation, provide different kinds of fields and tables, easy user parameter settings, simple authentication and scalability. Phpmyaccess also contains query report generation for RTF (word) and XLS (http://www.aliyun.com/zixun/aggregation/16544.html >excel) ...

Digital certificate Application Strategy--How to obtain digital certificate

Digital certificates can be applied to the relevant CA organizations on the Internet or to be generated by using tools such as MakeCert. You can apply for individual and unit digital certificates, secure e-mail certificates, code signing certificates, and server certificates, respectively, for different occasions. Online application of digital certificates you can apply for digital certificates to some CA centers online, and there are many CA centers dedicated to providing digital certificates online, such as China Digital Authentication Network (www.ca365.com ">http://www.ca365.com") ...

Seven features of Windows Azure storage Service

The Windows Azure Data storage service, built on the Windows Azure Cloud computing platform, leverages the advantages of the Windows Azure Cloud computing platform with the following features: (1) high-security users can customize the security level of data, such as public or private data. Public data can be accessed by anyone, but users of private data must be authorized and authenticated to access it.   Authorization and authentication are achieved by accessing the key, and only the person with access to the key can access the private data. (2) ...

Public Cloud Service Certification

Public Cloud service authentication Li Wei September 2013--The necessity of public cloud service authentication--Foreign public cloud service authentication--the progress of domestic public cloud service certification public Cloud service certification

Apple or open fingerprint authentication

According to the U.S. technology blog Re / code, Apple did not announce at a recent WWDC conference about how the iPhone will be able to facilitate payments in physical stores and other applications in the future. (This is probably because those plans are still unfinished.) But it comes with an appetizer - the latest news on how Touch ID fingerprinting technology will work in the future. So far, iPhone users can only do a few things with the fingerprint technology: unlock your phone, go through iTunes and the App Store ...

Elefant CMS 0.9.6-beta release MVC framework System

Elefant is a redesigned MVC framework system in PHP, including a complete and simple new CMS. (More information: http://www.elefantcms.com/) Elefant main features and features: -Simple URL routing-secure database extraction and modeling system-default output filter compiled template-Integrated cache system-Flexible input validation (server side and browser)-Simple table handling -17813.html "> Customizable user Authentication-International ...

McAfee improves cloud computing security to new heights

McAfee recently announced enhancements to its McAfee Cloud security Platform. As the industry's only content-aware platform, McAfee Cloud security Platform protects businesses and the cloud from all major information transfer channels, such as e-mail, Web, and authentication, helping organizations secure and efficiently leverage cloud-based services and solutions. This platform can be customer ...

Win8 password is not afraid to lose! Cloud Storage for user information

According to foreign media reports, Windows 8 will contain a credential manager that keeps the user's identity authentication information on the cloud, making it more secure to store and manage Web and Windows user credentials. Windows 8 User information enables cloud storage (Image source: Internet) from the relevant information, Windows 8 enables users to create and store passwords and synchronize them to any other recipient's Windows 8 machine. It is reported that users need to have ...

Research on data search and encryption scheme based on cloud computing

Research on data search and encryption scheme based on cloud computing re-appointment, Jianhua, Sun Huijie The technology of data search and encryption under cloud computing environment is the research hotspot at present. In view of the shortcomings of existing schemes, an improved data search and encryption scheme is proposed in this paper. In the area of data lookup, in this paper, the identity management model is established, and then the identity-based authentication algorithm is proposed to realize the optimal assignment between the system resources and the number of identities. In data encryption, a computational encryption scheme CES is proposed, which can support fuzzy retrieval of cloud data and basic arithmetic operation, Effectively to the user's ...

The 10 big aspects that must be clearly understood in the application of the moving cloud

Cloud computing has been a household name for some time, and many positive energies are driving business applications into the cloud. Of course, when you move an application to the cloud, you can't access the entire application. Because many applications must be kept within the enterprise, such as user authentication, data services, data integration, and so on. Here's a list of the 10 most needed points for enterprise applications to cloud: security--cloud persistence and communication Data software licensing mode performance disk I/O application infrastructure sharing mixed Model network connectivity environment storage open source and pay ...

Lily Nets, one of China's three most romantic websites, finally announced a radical change.

Abstract: In love for the name of fraud, frequent one-night stand, extramarital love moral decay, often see the negative information in the newspapers, so that the marriage web site in the past six months encountered an unprecedented trust crisis. In the bitter experience, one of China's three marriage websites, the lily Nets finally announced to love for the name of fraud, frequent one-night stand, extramarital love moral decay, frequent news of the negative information, so that love and marriage Web site in the past six months encountered an unprecedented trust crisis. After the bitter experience, one of China's three marriage websites has finally announced a radical change--real name and identity authentication. "First, take three months to get all the ...

Smart bracelet into fairy tales, Disney makes you feel the real world magic Legend

Hunting Cloud Net Note: Recent Apple Watch hot abnormal, wearable equipment swept the market, the Disney Magic Wrist strap also take advantage of this trend out of the show.   Think what you think, ahead of the service, the full grasp of the sights, bring people 0 pressure, 0 disturbing experience! This time, Disney makes you feel the Magic legend in the real world! If you are imagining what the future will look like, you might as well come with me and have a vision. A few years later, the mobile phone has been promoted to personal butler, in addition to managing finance, or strong authentication. It has a lot of jobs, and we can get through ...

Wikid fervent authentication System Blackberry Software token 3.0.10 Release

Wikid fervent http://www.aliyun.com/zixun/aggregation/11646.html ">authentication system is an extensible security dual-factor authentication system that is easy to implement and manage , the user can authenticate automatically without hardware tokens. It supports simple APIs, multiple domains, fault-tolerant and scalable replication through Ruby, PHP, Java, COM, Python, ...

Lemonldap::ng v1.0.3 publishes a modular web single sign-on system

Lemonldap::ng is a modular Web single sign-on system based on the Apache::session module. It simplifies the protection area for building applications. Can manage authentication and authorization to achieve complete AAA protection. Lemonldap::ng is completely lemonldap based on the TAR package containing all the required components, but the modules developed for LEMONLDAP will not be available on lemonldap::ng. Lemo ...

Apple pay to push digital wallet revolution

According to foreign media reports, Apple October 20 launched the mobile payment system Apple Pay, using Apple iOS device fingerprint sensor to complete the identity authentication function. Less than 2 months after the launch, Apple pay was supported by credit cards that accounted for 90% of the U.S. credit card transactions. Apple Pay quickly received credit card company support, indicating that it will soon be compatible with all credit cards in the United States. More importantly, with the current momentum of development, Apple pay officially opened a new era of digital wallet curtain. Bank cards may soon be the past. ...

Total Pages: 19 1 .... 4 5 6 7 8 .... 19 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.