700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ ReadersThis Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
Original Articles Open Access
For the information security issues of cloud computing, this paper studies the security management methods of cloud computing authorized user, analyzes the vulnerabilities of OTP and proposed security authentication scheme based on OTP authentication .This authentication enables two-way authentication between the user and the service provider, effectively prevent middleman attack, reduce information leakage and relise secure communications.
To read the full article Peer-reviewed Article PDF
Author(s): Yuan Bao Li
Anonymous OTP, Cloud Computing, Authorized User, Security Management Method, Management