메뉴 건너뛰기




Volumn 178, Issue 14, 2008, Pages 2968-2982

An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids

Author keywords

Digital signature; Grid computing; ID based signature; Proxy certificate; Right delegation; Security

Indexed keywords

COMPUTATIONAL METHODS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; GRID COMPUTING; NETWORK SECURITY; PROBLEM SOLVING;

EID: 43849099712     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2008.03.010     Document Type: Article
Times cited : (3)

References (27)
  • 1
    • 84956985315 scopus 로고    scopus 로고
    • R.P. Brent, Recent progress and prospects for integer factorisation algorithms, in: Proceedings of the Computing and Combinatorics: Sixth Annual International Conference - COCOOON 2000, LNCS, vol. 1858, 2000, pp. 3-22.
    • R.P. Brent, Recent progress and prospects for integer factorisation algorithms, in: Proceedings of the Computing and Combinatorics: Sixth Annual International Conference - COCOOON 2000, LNCS, vol. 1858, 2000, pp. 3-22.
  • 2
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Boneh D., Lynn B., and Shacham H. Short signatures from the weil pairing. Journal of Cryptology 17 4 (2004) 297-319
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 3
    • 23044435243 scopus 로고    scopus 로고
    • Efficient implementation of pairing-based cryptosystems
    • Barreto P., Lynn B., and Scott M. Efficient implementation of pairing-based cryptosystems. Journal of Cryptology 17 4 (2004) 321-334
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 321-334
    • Barreto, P.1    Lynn, B.2    Scott, M.3
  • 4
    • 35248844436 scopus 로고    scopus 로고
    • C. Cha, J. Cheon, An identity-based signature from gap Diffie-Hellman groups, in: Proceedings of the Public Key Cryptography - PKC 2003, LNCS, vol. 2139, 2003, pp. 18-30.
    • C. Cha, J. Cheon, An identity-based signature from gap Diffie-Hellman groups, in: Proceedings of the Public Key Cryptography - PKC 2003, LNCS, vol. 2139, 2003, pp. 18-30.
  • 5
    • 0032218229 scopus 로고    scopus 로고
    • I. Foster, C. Kesselman, G. Tsudik, S. Tuecke, A security architecture for computational grids, in: Proceedings of the Fifth ACM Conference on Computers and Communications Security, 1998, pp. 83-91.
    • I. Foster, C. Kesselman, G. Tsudik, S. Tuecke, A security architecture for computational grids, in: Proceedings of the Fifth ACM Conference on Computers and Communications Security, 1998, pp. 83-91.
  • 7
    • 43849088077 scopus 로고    scopus 로고
    • The Globus Alliance, Globus Project. .
    • The Globus Alliance, Globus Project. .
  • 8
    • 43849113518 scopus 로고    scopus 로고
    • The Globus Alliance website. .
    • The Globus Alliance website. .
  • 9
    • 43849111762 scopus 로고    scopus 로고
    • The Globus Alliance website. .
    • The Globus Alliance website. .
  • 10
    • 43849096337 scopus 로고    scopus 로고
    • GMP Library (the GNU Multiple Precision Arithmetic Library). .
    • GMP Library (the GNU Multiple Precision Arithmetic Library). .
  • 11
    • 35248867510 scopus 로고    scopus 로고
    • F. Hess, Efficient identity based signature schemes based on pairings, in: Proceedings of the Selected Areas in Cryptography - SAC'02, LNCS, vol. 2595, 2002, pp. 310-324.
    • F. Hess, Efficient identity based signature schemes based on pairings, in: Proceedings of the Selected Areas in Cryptography - SAC'02, LNCS, vol. 2595, 2002, pp. 310-324.
  • 12
    • 38949204473 scopus 로고    scopus 로고
    • Y. Kawahara, T. Takagi, E. Okamoto, Efficient Implementation of Tate Pairing on Mobile Phone using Java, in: Proceedings of the International Conferences on Computational intelligence and Security, CIS 2006, 2006, pp. 1247-1252.
    • Y. Kawahara, T. Takagi, E. Okamoto, Efficient Implementation of Tate Pairing on Mobile Phone using Java, in: Proceedings of the International Conferences on Computational intelligence and Security, CIS 2006, 2006, pp. 1247-1252.
  • 13
    • 1842715081 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • Lauter K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 12 1 (2004) 62-67
    • (2004) IEEE Wireless Communications , vol.12 , Issue.1 , pp. 62-67
    • Lauter, K.1
  • 14
    • 84937389342 scopus 로고    scopus 로고
    • T. Okamoto, D. Pointcheval, The gap-problems: a new class of problems for the security of cryptographic schemes, in: Proceedings of the Public Key Cryptography 2001, LNCS, vol. 1992, 2001, pp. 104-118.
    • T. Okamoto, D. Pointcheval, The gap-problems: a new class of problems for the security of cryptographic schemes, in: Proceedings of the Public Key Cryptography 2001, LNCS, vol. 1992, 2001, pp. 104-118.
  • 15
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • Paterson K. ID-based signatures from pairings on elliptic curves. Electronics Letters 38 18 (2002) 1025-1026
    • (2002) Electronics Letters , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.1
  • 16
    • 43849109249 scopus 로고    scopus 로고
    • PBC Library (The Pairing-based Cryptography Library). .
    • PBC Library (The Pairing-based Cryptography Library). .
  • 17
    • 43849109875 scopus 로고    scopus 로고
    • L. Perlman, V. Welch, I. Foster, C. Kesselman, S. Tuecke, Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile (RFC 3820), 2004.
    • L. Perlman, V. Welch, I. Foster, C. Kesselman, S. Tuecke, Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile (RFC 3820), 2004.
  • 18
    • 85020598353 scopus 로고    scopus 로고
    • A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of the Crypto'84, LNCS, vol. 196, 1985, pp. 47-53.
    • A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of the Crypto'84, LNCS, vol. 196, 1985, pp. 47-53.
  • 19
    • 33750321874 scopus 로고    scopus 로고
    • Distributed computing model for processing remotely sensed images based on grid computing
    • Shen Z., Luo J., Huang G., Ming D., Ma W., and Sheng H. Distributed computing model for processing remotely sensed images based on grid computing. Information Sciences 177 (2007) 504-518
    • (2007) Information Sciences , vol.177 , pp. 504-518
    • Shen, Z.1    Luo, J.2    Huang, G.3    Ming, D.4    Ma, W.5    Sheng, H.6
  • 20
    • 4944225478 scopus 로고    scopus 로고
    • Architecture design of grid GIS and its applications on image processing based on LAN
    • Shen Z., Luo J., Zhou C., Cai S., Zheng J., Chen Q., Ming D., and Sun Q. Architecture design of grid GIS and its applications on image processing based on LAN. Information Sciences 166 (2004) 1-17
    • (2004) Information Sciences , vol.166 , pp. 1-17
    • Shen, Z.1    Luo, J.2    Zhou, C.3    Cai, S.4    Zheng, J.5    Chen, Q.6    Ming, D.7    Sun, Q.8
  • 21
    • 43849102415 scopus 로고    scopus 로고
    • R. Sakai, K. Ohgishi, M. Kasahar, Cryptosystems based on pairing, in: Proceedings of the 2000 Symposium on Cryptography and Information Security - SCIS'00, 2000, pp. 26-28.
    • R. Sakai, K. Ohgishi, M. Kasahar, Cryptosystems based on pairing, in: Proceedings of the 2000 Symposium on Cryptography and Information Security - SCIS'00, 2000, pp. 26-28.
  • 22
    • 43849094382 scopus 로고    scopus 로고
    • Teraflops Research Chip. .
    • Teraflops Research Chip. .
  • 23
    • 36549018652 scopus 로고    scopus 로고
    • Interschema correspondence establishment in a cooperative OWL-based multi-information server grid environment
    • Tawil A.R., Montebello M., Bahsoon R., Gray W.A., and Fiddian N.J. Interschema correspondence establishment in a cooperative OWL-based multi-information server grid environment. Information Sciences 178 4 (2008) 1011-1031
    • (2008) Information Sciences , vol.178 , Issue.4 , pp. 1011-1031
    • Tawil, A.R.1    Montebello, M.2    Bahsoon, R.3    Gray, W.A.4    Fiddian, N.J.5
  • 24
    • 43849101320 scopus 로고    scopus 로고
    • V. Welch, I. Foster, C. Kesselman, O. Mulmo, L. Peralman, S. Tuecke, J. Gawor, S. Meder, F. Siebenlist, X.509 Proxy Certificates for Dynamic Delegation, in: Proceedings of the Third Annual PKI Workshop, 2004. .
    • V. Welch, I. Foster, C. Kesselman, O. Mulmo, L. Peralman, S. Tuecke, J. Gawor, S. Meder, F. Siebenlist, X.509 Proxy Certificates for Dynamic Delegation, in: Proceedings of the Third Annual PKI Workshop, 2004. .
  • 25
    • 24944445896 scopus 로고    scopus 로고
    • H. Yoon, J. Cheon, Y. Kim, Batch verifications with ID-based signatures, in: Proceedings of the International Conferences on Information Security and Cryptology (ICISC) 2005, LNCS, vol. 3506, 2005, pp. 233-248.
    • H. Yoon, J. Cheon, Y. Kim, Batch verifications with ID-based signatures, in: Proceedings of the International Conferences on Information Security and Cryptology (ICISC) 2005, LNCS, vol. 3506, 2005, pp. 233-248.
  • 26
    • 34547828778 scopus 로고    scopus 로고
    • A collaborative virtual geographic environment based on P2P and Grid technologies
    • Zhu J., Gong J., Liu W., Song T., and Zhang J. A collaborative virtual geographic environment based on P2P and Grid technologies. Information Sciences 177 21 (2007) 4621-4633
    • (2007) Information Sciences , vol.177 , Issue.21 , pp. 4621-4633
    • Zhu, J.1    Gong, J.2    Liu, W.3    Song, T.4    Zhang, J.5
  • 27
    • 34447332236 scopus 로고    scopus 로고
    • Design and development of distributed virtual geographic environment system based on web services
    • Zhang J., Gong J., Lin H., Wang G., Huang J., Zhu J., Xu B., and Teng J. Design and development of distributed virtual geographic environment system based on web services. Information Sciences 177 19 (2007) 3968-3980
    • (2007) Information Sciences , vol.177 , Issue.19 , pp. 3968-3980
    • Zhang, J.1    Gong, J.2    Lin, H.3    Wang, G.4    Huang, J.5    Zhu, J.6    Xu, B.7    Teng, J.8


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.