We propose Proxy Certificate Trust List (PCTL) to efficiently record delegation traces for grid computing. Our security solution based on PCTL provides functions as follows: (1) On-demand inquiries about real time delegation information of grid computing underway; (2) Lightweight mutual authentication that is beneficial for proxy nodes with limited computation power as wireless devices in mobile computing; (3) A kind of revocation mechanism for proxy certificates to improve the security and availability of grid computing
In order to establish trust relationship between service requesters and providers in an open decentr...
Grids are intended to enable cross-organizational interactions which makes Grid security a challengi...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
[[abstract]]GSI (Grid Security Infrastructure) provides the security in grids that it is using proxy...
Password-based authentication is still the most widelyused authentication mechanism, largely because...
A central problem for Grid (or web) services is how to gain confidence that a remote principal (user...
AbstractThe paper describes some special aspects of the security infrastructure for distributed com-...
Abstract. Delegation is an important tool for authorization in large distributed environments. Howev...
Proxy credentials are commonly used in security systems when one entity wishes to grant to another e...
We propose mutual authentication and session key exchange protocols based on certificates for the In...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
We describe a resource discovery and communication sys-tem designed for security and privacy. All ob...
5G mobile networks are promising to offer mobile users unrivaled experiences with infinite networkin...
ABSTRACT: This paper looks at the problem of privilege delegation and revocation in distributed perv...
Single sign-on and delegation of privileges are fundamental tenets upon which e-Infrastructures and ...
In order to establish trust relationship between service requesters and providers in an open decentr...
Grids are intended to enable cross-organizational interactions which makes Grid security a challengi...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
[[abstract]]GSI (Grid Security Infrastructure) provides the security in grids that it is using proxy...
Password-based authentication is still the most widelyused authentication mechanism, largely because...
A central problem for Grid (or web) services is how to gain confidence that a remote principal (user...
AbstractThe paper describes some special aspects of the security infrastructure for distributed com-...
Abstract. Delegation is an important tool for authorization in large distributed environments. Howev...
Proxy credentials are commonly used in security systems when one entity wishes to grant to another e...
We propose mutual authentication and session key exchange protocols based on certificates for the In...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
We describe a resource discovery and communication sys-tem designed for security and privacy. All ob...
5G mobile networks are promising to offer mobile users unrivaled experiences with infinite networkin...
ABSTRACT: This paper looks at the problem of privilege delegation and revocation in distributed perv...
Single sign-on and delegation of privileges are fundamental tenets upon which e-Infrastructures and ...
In order to establish trust relationship between service requesters and providers in an open decentr...
Grids are intended to enable cross-organizational interactions which makes Grid security a challengi...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...