Identity-based authentication for cloud computing
Cloud computing is a recently developed new technology for complex systems with massive-
scale services sharing among numerous users. Therefore, authentication of both users and …
scale services sharing among numerous users. Therefore, authentication of both users and …
Ensure hierarchal identity based data security in cloud environment
Cloud computing has emerged as a new promising field in the internet. It can be thought as
a new architecture for the next generation of IT enterprises. It allows the user to access …
a new architecture for the next generation of IT enterprises. It allows the user to access …
Transformation-based framework for record matching
A Arasu, S Chaudhuri, R Kaushik - 2008 IEEE 24th …, 2008 - ieeexplore.ieee.org
Today's record matching infrastructure does not allow a flexible way to account for synonyms
such as" Robert" and" Bob" which refer to the same name, and more general forms of string …
such as" Robert" and" Bob" which refer to the same name, and more general forms of string …
Identity-based cryptography for grid security
The majority of current security architectures for grid systems use public key infrastructure
(PKI) to authenticate identities of grid members and to secure resource allocation to these …
(PKI) to authenticate identities of grid members and to secure resource allocation to these …
Identity-based cryptography for cloud security
Cloud computing is a style of computing in which dynamically scalable and commonly
virtualized resources are provided as a service over the Internet. This paper, first presents a …
virtualized resources are provided as a service over the Internet. This paper, first presents a …
[PDF][PDF] Efficient certificateless authentication and key agreement (CL-AK) for grid computing.
Most of the current security architectures for grid systems use conventional public key
infrastructure (PKI) to authenticate grid members and to secure resource allocation to these …
infrastructure (PKI) to authenticate grid members and to secure resource allocation to these …
An identity-based security infrastructure for cloud environments
C Schridde, T Dörnemann, E Juhnke… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
This paper presents a novel security infrastructure for deploying and using service-oriented
Cloud applications securely without having to face the complexity associated with certificate …
Cloud applications securely without having to face the complexity associated with certificate …
[PDF][PDF] On the application of identity-based cryptography in grid security
HW Lim - 2006 - core.ac.uk
This thesis examines the application of identity-based cryptography (IBC) in designing
security infrastructures for grid applications. In this thesis, we propose a fully identity-based …
security infrastructures for grid applications. In this thesis, we propose a fully identity-based …
Architecture and performance evaluation of 3D CMOS-NEM FPGA
In this paper, we introduce a reconfigurable architecture, named 3D CMOS-NEM FPGA,
which utilizes Nanoelectromechanical (NEM) relays and 3D integration techniques …
which utilizes Nanoelectromechanical (NEM) relays and 3D integration techniques …
Identity-based authentication protocol for grid
L Hongwei, S Shixin, Y Haomiao - Journal of Systems Engineering and …, 2008 - Elsevier
Current grid authentication frameworks are achieved by applying the standard SSL
authentication protocol (SAP). The authentication process is very complicated, and …
authentication protocol (SAP). The authentication process is very complicated, and …