Abstract
Grid system [1] involves the collaborative use of computers, networks, devices, software, databases and interfaces maintained by multiple organizations. In recent years, the development of Grid system [2], [3] has gained increasing interests from researchers. In this paper, a security solution is proposed for Grid system without public key settings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proc. of the ACM Conference on Computer and Communications Security, pp. 83–92 (1998)
The Globus Alliance. The Globus Project, http://www.globus.org/
Grid Software security. Components for Grid security, http://www.globus.org/grid_software/security/
Chang, Y., Chang, C., Liu, Y.: Password authentication without the server public key. IEICE Transactions on Communications E87-B(10), 3088–3091 (2004)
Yoon, E., Yoo, K.: An Efficient Password Authentication Scheme Without Using the Server Public Key for Grid Computing. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol. 3795, pp. 149–154. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Das, M.L. (2012). Grids Security without Public Key Settings. In: Ramanujam, R., Ramaswamy, S. (eds) Distributed Computing and Internet Technology. ICDCIT 2012. Lecture Notes in Computer Science, vol 7154. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28073-3_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-28073-3_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28072-6
Online ISBN: 978-3-642-28073-3
eBook Packages: Computer ScienceComputer Science (R0)