iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.32604/CSSE.2022.024302
{"id":"https://openalex.org/W4225244450","doi":"https://doi.org/10.32604/csse.2022.024302","title":"A Proposed Biometric Authentication Model to Improve Cloud Systems Security","display_name":"A Proposed Biometric Authentication Model to Improve Cloud Systems Security","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4225244450","doi":"https://doi.org/10.32604/csse.2022.024302"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.32604/csse.2022.024302","pdf_url":"https://file.techscience.com/ueditor/files/csse/TSP_CSSE-43-2/TSP_CSSE_24302/TSP_CSSE_24302.pdf","source":{"id":"https://openalex.org/S4210214087","display_name":"Computer Systems Science and Engineering","issn_l":"0267-6192","issn":["0267-6192"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://file.techscience.com/ueditor/files/csse/TSP_CSSE-43-2/TSP_CSSE_24302/TSP_CSSE_24302.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028122132","display_name":"Hosam El- El-Sofany","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140988","display_name":"Cairo Higher Institute","ror":"https://ror.org/045rvh172","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210140988"]},{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["EG","SA"],"is_corresponding":true,"raw_author_name":"Hosam El- El-Sofany","raw_affiliation_strings":["Cairo Higher Institute for Engineering, Computer Science and Management, Cairo, Egypt","King Khalid University, Abha, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Cairo Higher Institute for Engineering, Computer Science and Management, Cairo, Egypt","institution_ids":["https://openalex.org/I4210140988"]},{"raw_affiliation_string":"King Khalid University, Abha, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028122132"],"corresponding_institution_ids":["https://openalex.org/I4210140988","https://openalex.org/I82952536"],"apc_list":null,"apc_paid":null,"fwci":2.45,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":6,"citation_normalized_percentile":{"value":0.99998,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":85,"max":87},"biblio":{"volume":"43","issue":"2","first_page":"573","last_page":"589"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9933,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9933,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9862,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9851,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.4488353},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.41948006}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.8045735},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.77252626},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7339789},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.72140634},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.621415},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.58946484},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4488353},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.41948006},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41734594},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.41644758},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.2643261},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07517007},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.32604/csse.2022.024302","pdf_url":"https://file.techscience.com/ueditor/files/csse/TSP_CSSE-43-2/TSP_CSSE_24302/TSP_CSSE_24302.pdf","source":{"id":"https://openalex.org/S4210214087","display_name":"Computer Systems Science and Engineering","issn_l":"0267-6192","issn":["0267-6192"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.32604/csse.2022.024302","pdf_url":"https://file.techscience.com/ueditor/files/csse/TSP_CSSE-43-2/TSP_CSSE_24302/TSP_CSSE_24302.pdf","source":{"id":"https://openalex.org/S4210214087","display_name":"Computer Systems Science and Engineering","issn_l":"0267-6192","issn":["0267-6192"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1483962778","https://openalex.org/W2606340623","https://openalex.org/W2768851180","https://openalex.org/W2808804937","https://openalex.org/W2908400479","https://openalex.org/W2914768460","https://openalex.org/W2944916619","https://openalex.org/W3007891674","https://openalex.org/W3095933406","https://openalex.org/W3158613031","https://openalex.org/W3209375835"],"related_works":["https://openalex.org/W4309172146","https://openalex.org/W4291701200","https://openalex.org/W4238865314","https://openalex.org/W3104966193","https://openalex.org/W3000652178","https://openalex.org/W2784315464","https://openalex.org/W2784017372","https://openalex.org/W2363363251","https://openalex.org/W2123843216","https://openalex.org/W192327621"],"abstract_inverted_index":{"Most":[0],"user":[1,15,149],"authentication":[2,49,72,88,141],"mechanisms":[3],"of":[4,67,79,94,104,110,148,174,179,184,190],"cloud":[5,56,159],"systems":[6],"depend":[7],"on":[8],"the":[9,62,68,76,87,95,101,105,132,139,146,162],"credentials":[10],"approach":[11,26],"in":[12,83,108],"which":[13],"a":[14,20,46,123,171,181,187],"submits":[16],"his/her":[17],"identity":[18],"through":[19],"username":[21],"and":[22,54,64,86,117,130,144,186],"password.":[23],"Unfortunately,":[24],"this":[25],"has":[27],"many":[28],"security":[29],"problems":[30],"because":[31],"personal":[32],"data":[33],"can":[34],"be":[35],"stolen":[36],"or":[37],"recognized":[38],"by":[39],"hackers.":[40],"This":[41],"paper":[42,99],"aims":[43],"to":[44],"present":[45],"cloud-based":[47,70],"biometric":[48,71,77,140],"model":[50,107],"(CBioAM)":[51],"for":[52,128,157],"improving":[53],"securing":[55,158],"services.":[57],"The":[58,98,119,135,151,165],"research":[59,120],"study":[60,121],"presents":[61,100],"verification":[63],"identification":[65],"processes":[66],"proposed":[69,106,133,136,163],"system":[73,137],"(CBioAS),":[74],"where":[75],"samples":[78],"users":[80],"are":[81],"saved":[82],"database":[84],"servers":[85],"process":[89,142],"is":[90],"implemented":[91],"without":[92],"loss":[93],"users\u2019":[96],"information.":[97,150],"performance":[102,172],"evaluation":[103],"terms":[109],"three":[111],"main":[112],"characteristics":[113],"including":[114],"accuracy,":[115],"sensitivity,":[116],"specificity.":[118],"introduces":[122],"novel":[124],"algorithm":[125],"called":[126],"\u201cBio_Authen_as_a_Service\u201d":[127],"implementing":[129],"evaluating":[131],"model.":[134,164],"performs":[138],"securely":[143],"preserves":[145],"privacy":[147],"experimental":[152],"result":[153],"was":[154],"highly":[155],"promising":[156],"services":[160],"using":[161],"experiments":[166],"showed":[167],"encouraging":[168],"results":[169],"with":[170],"average":[173,178,183,189],"93.94%,":[175],"an":[176],"accuracy":[177],"96.15%,":[180],"sensitivity":[182],"87.69%,":[185],"specificity":[188],"97.99%.":[191]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4225244450","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2024-12-11T21:47:04.203216","created_date":"2022-05-01"}