Identity-based cryptography for grid security
HW Lim, KG Paterson - International Journal of Information Security, 2011 - Springer
The majority of current security architectures for grid systems use public key infrastructure
(PKI) to authenticate identities of grid members and to secure resource allocation to these …
(PKI) to authenticate identities of grid members and to secure resource allocation to these …
WPS mediation: An approach to process geospatial data on different computing backends
The OGC Web Processing Service (WPS) specification allows generating information by
processing distributed geospatial data made available through Spatial Data Infrastructures …
processing distributed geospatial data made available through Spatial Data Infrastructures …
What can identity-based cryptography offer to web services?
Web services are seen as the enabler of service-oriented computing, a promising next
generation distributed computing technology. Independently, identity-based cryptography is …
generation distributed computing technology. Independently, identity-based cryptography is …
Practical Certificate-Less Infrastructure with Application in TLS
We propose highly efficient certificate-less (CL) protocols for the infrastructure used by
authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without …
authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without …
Multi-key hierarchical identity-based signatures
HW Lim, KG Paterson - IMA International Conference on Cryptography …, 2007 - Springer
We motivate and investigate a new cryptographic primitive that we call multi-key hierarchical
identity-based signatures (multi-key HIBS). Using this primitive, a user is able to prove …
identity-based signatures (multi-key HIBS). Using this primitive, a user is able to prove …
User-friendly and certificate-free grid security infrastructure
Certificate-based public key infrastructures are currently widely used in computational grids
to support security services. From a user's perspective, however, certificate acquisition is …
to support security services. From a user's perspective, however, certificate acquisition is …
[图书][B] Spatial data infrastructures for environmental sciences
G Giuliani - 2011 - academia.edu
Today we are living in a globalized world with rapidly evolving processes including climate
and land cover change, population growth that are impacting the environment. In parallel …
and land cover change, population growth that are impacting the environment. In parallel …
A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment
V Ruckmani, DGS Sadasivam - arXiv preprint arXiv:1001.1975, 2010 - arxiv.org
In recent times, a necessity has been raised in order to distribute computing applications
often across grids. These applications are dependent on the services like data transfer or …
often across grids. These applications are dependent on the services like data transfer or …
Role signatures for access control in open distributed systems
J Crampton, HW Lim - IFIP International Information Security Conference, 2008 - Springer
Implementing access control efficiently and effectively in an open and distributed system is a
challenging problem. One reason for this is that users requesting access to remote …
challenging problem. One reason for this is that users requesting access to remote …
Combining incomparable public session keys and certificateless public key cryptography for securing the communication between grid participants
E Papalilo, B Freisleben - … International Conferences" On the Move to …, 2007 - Springer
Securing the communication between participants in Grid computing environments is an
important task, because the participants do not know if the exchanged information has been …
important task, because the participants do not know if the exchanged information has been …