Method and system for identity and access management for blockchain interoperability
VK Madisetti, A Bahga - US Patent 11,538,031, 2022 - Google Patents
(57) ABSTRACT A method of generating wallets for discrete blockchain networks comprising
receiving a primary and a first second ary seeds, generating an enhanced hierarchical …
receiving a primary and a first second ary seeds, generating an enhanced hierarchical …
Privacy protection of grid services in a collaborative SOA environment
D Jana, A Chaudhuri, A Datta… - TENCON 2005-2005 …, 2005 - ieeexplore.ieee.org
Grid computing has emerged as a powerful extension of Web for a request-response
interaction between service providers and service consumers. Grid computing caters to this …
interaction between service providers and service consumers. Grid computing caters to this …
Framework for Handling Security Issues in Interoperable Grid Services
D Jana, A Chaudhuri, A Datta… - 2005 Annual IEEE India …, 2005 - ieeexplore.ieee.org
Grid computing has emerged as a powerful extension of web for a request-response
interaction between service providers and service consumers. Today, enterprises focus on …
interaction between service providers and service consumers. Today, enterprises focus on …
Interoperability and security issues of grid services for ubiquitous computing
D Jana, A Chaudhuri, A Datta… - … Conference on Computer …, 2006 - computer.org
In order to accelerate the visualization processes of huge engineering data based on
computational meshes, the extraction of huge data are necessary. A data extraction …
computational meshes, the extraction of huge data are necessary. A data extraction …
Method and system for zero-knowledge and identity based key management for decentralized applications
V Madisetti, A Bahga - US Patent 11,526,879, 2022 - Google Patents
A method for implementing zero-knowledge private key management for decentralized
applications including receiv ing an encrypted private key and user identification infor …
applications including receiv ing an encrypted private key and user identification infor …
Security Model of Service Oriented Computational Grids
D Jana, A Chaudhuri… - 2006 Annual IEEE India …, 2006 - ieeexplore.ieee.org
Grid infrastructure supports services on demand. Computational grids connected in a
service oriented way thus forming virtual enterprises need several security measures to be …
service oriented way thus forming virtual enterprises need several security measures to be …
Credential management enforcement and secure data storage in glite
This article describes new security solutions for Grid middleware, and specifically faces the
issues related to the management of users' and servers' credentials, together with storing …
issues related to the management of users' and servers' credentials, together with storing …
Method and system for zero-knowledge and identity based key management for decentralized applications
V Madisetti, A Bahga - US Patent 11,651,362, 2023 - Google Patents
(57) ABSTRACT A method for implementing zero-knowledge private key management for
including receiving an identity smart contract creation transaction from a zero-knowledge …
including receiving an identity smart contract creation transaction from a zero-knowledge …
Method and system for zero-knowledge and identity based key management for decentralized applications
V Madisetti, A Bahga - US Patent 11,720,891, 2023 - Google Patents
A method for implementing zero-knowledge private key management for decentralized
applications on a client device including registering an account with a verifier server …
applications on a client device including registering an account with a verifier server …
Distributed computer systems with time-dependent credentials
M Novak, PJ Leach, Y Zeng, S Sinha, KM Short… - US Patent …, 2015 - Google Patents
A distributed system in which time-dependent credentials are supplied by controllers that
operate according to different local times. Errors that might arise from the controllers …
operate according to different local times. Errors that might arise from the controllers …