Open Access   Article Go Back

BYOD with Multi-Factor Authentication

Surabhi Shukla1 , Neelam Joshi2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-6 , Page no. 104-107, Jun-2015

Online published on Jun 29, 2015

Copyright © Surabhi Shukla , Neelam Joshi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Surabhi Shukla , Neelam Joshi, “BYOD with Multi-Factor Authentication,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.104-107, 2015.

MLA Style Citation: Surabhi Shukla , Neelam Joshi "BYOD with Multi-Factor Authentication." International Journal of Computer Sciences and Engineering 3.6 (2015): 104-107.

APA Style Citation: Surabhi Shukla , Neelam Joshi, (2015). BYOD with Multi-Factor Authentication. International Journal of Computer Sciences and Engineering, 3(6), 104-107.

BibTex Style Citation:
@article{Shukla_2015,
author = {Surabhi Shukla , Neelam Joshi},
title = {BYOD with Multi-Factor Authentication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2015},
volume = {3},
Issue = {6},
month = {6},
year = {2015},
issn = {2347-2693},
pages = {104-107},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=559},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=559
TI - BYOD with Multi-Factor Authentication
T2 - International Journal of Computer Sciences and Engineering
AU - Surabhi Shukla , Neelam Joshi
PY - 2015
DA - 2015/06/29
PB - IJCSE, Indore, INDIA
SP - 104-107
IS - 6
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2498 2339 downloads 2366 downloads
  
  
           

Abstract

Data is currency in today’s world. Security teams are now tasked with protecting the brand and intellectual property through the protection of the second-most important asset of a company: data (the first one being people). There are two approaches here. The first is to label – or classify – information so users know if they can place it in the cloud or not. The second is to look at how IT provision can be changed to make security less burdensome. As tablets and smartphones become the primary work computing device, offering easy access to the cloud, users will be less tolerant of VPN, multiple logins etc. Smaller organizations typically rely on services such as iCloud. For these businesses, it would make sense to implement additional security measures provided such as two-factor authentication. In this paper I have highlighted the options which can be useful in the two-factor authentication.

Key-Words / Index Term

SLA. QoS, RBAC, IDM, OTP

References

[1] www.wikipedia.com
[2] www.techgig.com
[3] www.webopedia.com
[4] “Security and Privacy Challenges in Cloud Computing Environments”; IEEE security & privacy nov/dec 2010.
[5] “Information Assurance Framework”;2010
[6] Lee and Sill ;“A Design Space for dynamic service level agreements in Openstack”; Journal of Cloud Computing: Advances, Systems and Applications 2014, 3:17
[7] Kuyoro S. O., Ibikunle F., Awodele O.;“Cloud Computing Security Issues and Challenges”;International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011.
[8] Surabhi Shukla and Dharamjeet Singh;”Cloud’s Software-Security as a Service(S-SaaS) via Biometrics”; IJCSE, Volume (2): Issue (3):2014.
[9] Surabhi Shukla;”Public Cloud Security Challenges and Solutions”; IJSER, Volume (3): Issue (4): April 2015.