Identity-based cryptography for grid security

HW Lim, KG Paterson - International Journal of Information Security, 2011 - Springer
The majority of current security architectures for grid systems use public key infrastructure
(PKI) to authenticate identities of grid members and to secure resource allocation to these …

WPS mediation: An approach to process geospatial data on different computing backends

G Giuliani, S Nativi, A Lehmann, N Ray - Computers & Geosciences, 2012 - Elsevier
The OGC Web Processing Service (WPS) specification allows generating information by
processing distributed geospatial data made available through Spatial Data Infrastructures …

What can identity-based cryptography offer to web services?

J Crampton, HW Lim, KG Paterson - … of the 2007 ACM workshop on …, 2007 - dl.acm.org
Web services are seen as the enabler of service-oriented computing, a promising next
generation distributed computing technology. Independently, identity-based cryptography is …

Practical Certificate-Less Infrastructure with Application in TLS

L Duan, Y Li, L Liao - Cryptography, 2023 - mdpi.com
We propose highly efficient certificate-less (CL) protocols for the infrastructure used by
authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without …

Multi-key hierarchical identity-based signatures

HW Lim, KG Paterson - IMA International Conference on Cryptography …, 2007 - Springer
We motivate and investigate a new cryptographic primitive that we call multi-key hierarchical
identity-based signatures (multi-key HIBS). Using this primitive, a user is able to prove …

User-friendly and certificate-free grid security infrastructure

J Crampton, HW Lim, KG Paterson, G Price - International Journal of …, 2011 - Springer
Certificate-based public key infrastructures are currently widely used in computational grids
to support security services. From a user's perspective, however, certificate acquisition is …

[图书][B] Spatial data infrastructures for environmental sciences

G Giuliani - 2011 - academia.edu
Today we are living in a globalized world with rapidly evolving processes including climate
and land cover change, population growth that are impacting the environment. In parallel …

A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment

V Ruckmani, DGS Sadasivam - arXiv preprint arXiv:1001.1975, 2010 - arxiv.org
In recent times, a necessity has been raised in order to distribute computing applications
often across grids. These applications are dependent on the services like data transfer or …

Role signatures for access control in open distributed systems

J Crampton, HW Lim - IFIP International Information Security Conference, 2008 - Springer
Implementing access control efficiently and effectively in an open and distributed system is a
challenging problem. One reason for this is that users requesting access to remote …

Combining incomparable public session keys and certificateless public key cryptography for securing the communication between grid participants

E Papalilo, B Freisleben - … International Conferences" On the Move to …, 2007 - Springer
Securing the communication between participants in Grid computing environments is an
important task, because the participants do not know if the exchanged information has been …