Return to Article Details Authentication Model on Cloud Computing Download Download PDF