Application architecture for cloud
Cloud Computing Security, Reliability and Availability Issues Reference: Chapter 22, Guide to Computer Network Security, 2nd Edition, Springer, 2013. Joseph.
Content : Access and Authentication Technology Authentication methods: PPP, PAP, CHAP, EAP AAA, RADIUS, TACACS, TACACS, Kerberos Authentication Header.