Return to Article Details Review on authentication mechanisms in cloud computing Download Download PDF