Identity-based authentication for cloud computing

H Li, Y Dai, L Tian, H Yang - … CloudCom 2009, Bei**g, China, December 1 …, 2009 - Springer
Cloud computing is a recently developed new technology for complex systems with massive-
scale services sharing among numerous users. Therefore, authentication of both users and …

Ensure hierarchal identity based data security in cloud environment

S Kaushik, C Gandhi - Research Anthology on Blockchain …, 2021 - igi-global.com
Cloud computing has emerged as a new promising field in the internet. It can be thought as
a new architecture for the next generation of IT enterprises. It allows the user to access …

Transformation-based framework for record matching

A Arasu, S Chaudhuri, R Kaushik - 2008 IEEE 24th …, 2008 - ieeexplore.ieee.org
Today's record matching infrastructure does not allow a flexible way to account for synonyms
such as" Robert" and" Bob" which refer to the same name, and more general forms of string …

Identity-based cryptography for grid security

HW Lim, KG Paterson - International Journal of Information Security, 2011 - Springer
The majority of current security architectures for grid systems use public key infrastructure
(PKI) to authenticate identities of grid members and to secure resource allocation to these …

Identity-based cryptography for cloud security

H Li, Y Dai, B Yang - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Cloud computing is a style of computing in which dynamically scalable and commonly
virtualized resources are provided as a service over the Internet. This paper, first presents a …

[PDF][PDF] Efficient certificateless authentication and key agreement (CL-AK) for grid computing.

S Wang, Z Cao, H Bao - Int. J. Netw. Secur., 2008 - Citeseer
Most of the current security architectures for grid systems use conventional public key
infrastructure (PKI) to authenticate grid members and to secure resource allocation to these …

An identity-based security infrastructure for cloud environments

C Schridde, T Dörnemann, E Juhnke… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
This paper presents a novel security infrastructure for deploying and using service-oriented
Cloud applications securely without having to face the complexity associated with certificate …

[PDF][PDF] On the application of identity-based cryptography in grid security

HW Lim - 2006 - core.ac.uk
This thesis examines the application of identity-based cryptography (IBC) in designing
security infrastructures for grid applications. In this thesis, we propose a fully identity-based …

Architecture and performance evaluation of 3D CMOS-NEM FPGA

C Dong, C Chen, S Mitra, D Chen - International Workshop on …, 2011 - ieeexplore.ieee.org
In this paper, we introduce a reconfigurable architecture, named 3D CMOS-NEM FPGA,
which utilizes Nanoelectromechanical (NEM) relays and 3D integration techniques …

Identity-based authentication protocol for grid

L Hongwei, S Shixin, Y Haomiao - Journal of Systems Engineering and …, 2008 - Elsevier
Current grid authentication frameworks are achieved by applying the standard SSL
authentication protocol (SAP). The authentication process is very complicated, and …