REFERENCES
Alizadeh, M., Abolfazli, S., Zamani, M., Baaaharun, S., and
Sakurai, K. (2016). Authentication in mobile cloud
computing: A survey. Journal of Network and Com-
puter Applications, 61:59–80.
Amazon Web Services (2017). Amazon elastic compute
cloud - ec2. //https//aws.amazon.com/it/ec2/. Last acc.
14 June 2017.
Bean, M. (2015). Laravel 5 Essentials. Packt Publishing.
Braz, C. and Robert, J.-M. (2006). Security and usability:
The case of the user authentication methods. In Proc.
of IHM 06, pages 199–203, New York, NY, USA.
ACM.
Buzzanca, M., Carchiolo, V., Longheu, A., Malgeri, M., and
Mangioni, G. (2017). Direct trust assignment using
social reputation and aging. Journal of Ambient Intel-
ligence and Humanized Computing, 8(2):167–175.
Carchiolo, V., Grassia, M., Longheu, A., Malgeri, M., and
Mangioni, G. (2018). Exploiting long distance con-
nections to strengthen network robustness. In IDCS.
Carchiolo, V., Longheu, A., Malgeri, M., Iannello, S., Mar-
roccia, M., and Randazzo, A. (2019). Cloud in mobile
platforms: managing authentication/authorization. In
Advances in Intelligent Systems and Computing. In
Press.
Carchiolo, V., Longheu, A., Malgeri, M., and Mangioni,
G. (2015). The cost of trust in the dynamics of best
attachment. Computing and Informatics, 34:167–184.
Gai, K., Qiu, M., and Elnagdy, S. A. (2016). A novel secure
big data cyber incident analytics framework for cloud-
based cybersecurity insurance. In 2016 IEEE 2nd Big-
DataSecurity, HPSC, and IDS, pages 171–176.
Internet Security Research Group (2017). Let’s Encrypt.
https://letsencrypt.org/. Last acc. 14 June 2017.
Jeong, Y.-S., Park, J. S., and Park, J. H. (2015). An efficient
authentication system of smart device using multi fac-
tors in mobile cloud service architecture. Intl Journal
of Communication Systems, 28(4):659–674.
Mohsin, J. K., Han, L., Hammoudeh, M., and Hegarty, R.
(2017). Two factor vs multi-factor, an authentication
battle in mobile cloud computing environments. In
Proceedings of ICFNDS ’17, pages 39:1–39:10, New
York, NY, USA. ACM.
MongoDB, Inc (2019). MongoDB Atlas. https://www.
mongodb.com. Last acc. 12 Febraury 2019.
mongoose (2017). mongoose ODM. http://mongoosejs.
com/. Last acc. 15 September 2017.
Oh, D.-S., Kim, B.-H., and Lee, J.-K. (2011). A Study
on Authentication System Using QR Code for Mo-
bile Cloud Computing Environment, pages 500–507.
Springer Berlin Heidelberg, Berlin, Heidelberg.
OpenID Foundation (2019). OpenID. http://openid.net/.
Last acc. 19 Feb. 2019.
Parecki, A. (2019). OAuth. https://oauth.net. Last acc. 19
Feb. 2019.
Peter Mell, T. G. (2009). The NIST Definition of Cloud
Computing. https://www.nist.gov/sites/default/files/
documents/itl/cloud/cloud-def-v15.pdf. Last acc. 13
June 2017.
Recordon, D. and Reed, D. (2006). Openid 2.0: A platform
for user-centric identity management. In Proc. of DIM
’06, pages 11–16, New York, NY, USA. ACM.
salesforce (2019). SalesForce. https://www.salesforce.com.
Last acc. 5 Feb. 2019.
Sanaei, Z., Abolfazli, S., Gani, A., and Buyya, R. (2014).
Heterogeneity in mobile cloud computing: Taxonomy
and open challenges. IEEE Communications Surveys
Tutorials, 16(1):369–392.
Schwab, D. and Yang, L. (2013). Entity authentication in
a mobile-cloud environment. In Proc. of CSIIRW ’13,
pages 42:1–42:4, New York, NY, USA. ACM.
Song, Z., Sun, Y., Yan, H., Wu, D., Niu, P., and Wu, X.
(2018). Robustness of smart manufacturing informa-
tion systems under conditions of resource failure: A
complex network perspective. IEEE Access, 6:3731–
3738.
Taylor, O. (2017). Laravel - The PHP Framework for Web
Artisans. https://laravel.com/. Last acc. 30 Aug. 2017.
Taylor, O. (2019). Laravel Socialite. https://laravel.com/
docs/5.7/socialite. Last acc. 18 Febraury 2019.
Todorov, D. (2007). Mechanics of User Identification and
Authentication: Fundamentals of Identity Manage-
ment. CRC Press.
Vitalwerks Internet Solutions, L. (2017). No-IP. https://
www.noip.com/. Last acc. 15 Sept. 2017.
CLOSER 2019 - 9th International Conference on Cloud Computing and Services Science
256