Secure data communication is the most vital and crucial concern in Grid computing environment, where data flows across multiple components in different organizational domains that are not under control of the single data proprietor. An appropriate authentication mechanism is the very basic requisite for building a protected Grid environment. In this paper we have analyzed authentication related issues in Grid and proposed a novel Time Variant Authentication technique that will check the authenticity of remote user time to time throughout the accessing of the remote server which enhances Grid security
Abstract: The Smart Grid is formed by many sub-networks such as the Home Area Network (HAN), t which...
In a smart grid, the power service provider enables the expected power generation amount to be measu...
Smart grid has emerged as the next-generation electricity grid with power flow optimization and high...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...
Highly critical authentication in Grid Computing systems required secured data transmission to be pr...
There are security concerns when our sensitive data is placed in the third party infrastructure such...
Smart Grid (SG) provides enhancement to existing grids with two-way communication between the utilit...
Dynamicity in the data sharing has resulted in resource usage being more and more distributed and mo...
Abstract—1 This paper studies the security requirements for remote authentication and communication ...
A central problem for Grid (or web) services is how to gain confidence that a remote principal (user...
Abstract—Smart Grid (SG) consists of many sub-systems and networks, all working together as a system...
[[abstract]]Based upon Elliptic Curve Cryptosystem, a simple password user authentication scheme was...
open access articleIn a smart grid system, the utility server collects data from various smart grid ...
The malicious host problem is challenging in distributed systems such as grids and clouds. Rival org...
There are security concerns when our sensitive data is placed in the third party infrastructure such...
Abstract: The Smart Grid is formed by many sub-networks such as the Home Area Network (HAN), t which...
In a smart grid, the power service provider enables the expected power generation amount to be measu...
Smart grid has emerged as the next-generation electricity grid with power flow optimization and high...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...
Highly critical authentication in Grid Computing systems required secured data transmission to be pr...
There are security concerns when our sensitive data is placed in the third party infrastructure such...
Smart Grid (SG) provides enhancement to existing grids with two-way communication between the utilit...
Dynamicity in the data sharing has resulted in resource usage being more and more distributed and mo...
Abstract—1 This paper studies the security requirements for remote authentication and communication ...
A central problem for Grid (or web) services is how to gain confidence that a remote principal (user...
Abstract—Smart Grid (SG) consists of many sub-systems and networks, all working together as a system...
[[abstract]]Based upon Elliptic Curve Cryptosystem, a simple password user authentication scheme was...
open access articleIn a smart grid system, the utility server collects data from various smart grid ...
The malicious host problem is challenging in distributed systems such as grids and clouds. Rival org...
There are security concerns when our sensitive data is placed in the third party infrastructure such...
Abstract: The Smart Grid is formed by many sub-networks such as the Home Area Network (HAN), t which...
In a smart grid, the power service provider enables the expected power generation amount to be measu...
Smart grid has emerged as the next-generation electricity grid with power flow optimization and high...