메뉴 건너뛰기




Volumn , Issue , 2007, Pages 83-90

PKI-based authentication mechanisms in grid systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMMUNICATION SYSTEMS; GRID COMPUTING;

EID: 47749148118     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NAS.2007.42     Document Type: Conference Paper
Times cited : (17)

References (47)
  • 5
    • 85016749139 scopus 로고    scopus 로고
    • Fine-grained control of security capabilities
    • 60-82
    • D. Boneh, X. Ding, and G. Tsudik. Fine-grained control of security capabilities. ACM Trans. Inter. Tech., 4(1):60-82, 2004
    • (2004) ACM Trans. Inter. Tech , vol.4 , Issue.1
    • Boneh, D.1    Ding, X.2    Tsudik, G.3
  • 8
    • 47749118585 scopus 로고    scopus 로고
    • S. Chokhani, W. Ford, R. Sabett, C. Merrill, and S. Wu. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, 2003.
    • S. Chokhani, W. Ford, R. Sabett, C. Merrill, and S. Wu. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, 2003.
  • 9
    • 84948391696 scopus 로고    scopus 로고
    • A model of certificate revocation
    • D. Cooper. A model of certificate revocation. In IEEE 15th Annual ACSAC, pages 256-264, 1999.
    • (1999) IEEE 15th Annual ACSAC , pp. 256-264
    • Cooper, D.1
  • 10
    • 0033702950 scopus 로고    scopus 로고
    • D. Cooper. A More Efficient Use of Delta-CRLs. In IEEE Symposium on Security and Privacy, pages 199-202, 2000.
    • D. Cooper. A More Efficient Use of Delta-CRLs. In IEEE Symposium on Security and Privacy, pages 199-202, 2000.
  • 12
    • 9744257937 scopus 로고    scopus 로고
    • The KX.509 protocol
    • Technical Report 01-2, University of Michigan, February
    • W. Doster, M. Watts, and D. Hyde. The KX.509 protocol. Technical Report 01-2, University of Michigan, February 2001.
    • (2001)
    • Doster, W.1    Watts, M.2    Hyde, D.3
  • 14
    • 47749107770 scopus 로고    scopus 로고
    • Enforcer Group. Enforcer Homepage. At http://enforcer.sourceforge.net/, 2006.
    • Enforcer Group. Enforcer Homepage. At http://enforcer.sourceforge.net/, 2006.
  • 15
    • 20444495387 scopus 로고    scopus 로고
    • Hot service deployment in an ad hoc grid environment
    • New York, NY, USA
    • T. Friese, M. Smith, and B. Freisleben. Hot service deployment in an ad hoc grid environment. In ACM ICSOC '04, pages 75-83, New York, NY, USA, 2004.
    • (2004) ACM ICSOC '04 , pp. 75-83
    • Friese, T.1    Smith, M.2    Freisleben, B.3
  • 17
    • 47749115534 scopus 로고    scopus 로고
    • T. J. Genovese and M. Helm. Grid PKI Disclosure Statement. At http://caops.es.net/Documents/LastCALL/gridpds.pdf, 2003.
    • T. J. Genovese and M. Helm. Grid PKI Disclosure Statement. At http://caops.es.net/Documents/LastCALL/gridpds.pdf, 2003.
  • 18
  • 19
    • 0004256091 scopus 로고    scopus 로고
    • John Wiley & Sons, Inc, New York, NY, USA
    • D. Gollmann. Computer security. John Wiley & Sons, Inc., New York, NY, USA, 1999.
    • (1999) Computer security
    • Gollmann, D.1
  • 22
    • 33747612640 scopus 로고    scopus 로고
    • A theoretical inter-organizational trust-based security model
    • H. Hexmoor, S. Wilson, and S. Bhattaram. A theoretical inter-organizational trust-based security model. Knowl. Eng. Rev., 21(2):127-161, 2006.
    • (2006) Knowl. Eng. Rev , vol.21 , Issue.2 , pp. 127-161
    • Hexmoor, H.1    Wilson, S.2    Bhattaram, S.3
  • 24
  • 25
    • 47749118961 scopus 로고    scopus 로고
    • International Telecommunication Union. ITU-T Recommendation X.509, 1997.
    • International Telecommunication Union. ITU-T Recommendation X.509, 1997.
  • 26
    • 84958063551 scopus 로고    scopus 로고
    • On certificate revocation and validation
    • Springer-Verlag
    • P. Kocher. On certificate revocation and validation. Financial Cryptography ,Springer-Verlag, 1465:172-177, 1998.
    • (1998) Financial Cryptography , vol.1465 , pp. 172-177
    • Kocher, P.1
  • 31
    • 33646262102 scopus 로고    scopus 로고
    • A. Lioy,M.Marian, N.Moltchanova, andM. Pala. PKI past, present and future. International Journal of Information Security, Springer Berlin, pages 18-29, 2006.
    • A. Lioy,M.Marian, N.Moltchanova, andM. Pala. PKI past, present and future. International Journal of Information Security, Springer Berlin, pages 18-29, 2006.
  • 33
    • 47749139509 scopus 로고    scopus 로고
    • Shemp: Secure hardware enhanced myproxy
    • Technical Report 05-532, Dartmouth College, February
    • J. Marchesini and S. Smith. Shemp: Secure hardware enhanced myproxy. Technical Report 05-532, Dartmouth College, February 2005.
    • (2005)
    • Marchesini, J.1    Smith, S.2
  • 35
  • 36
    • 24944532382 scopus 로고    scopus 로고
    • NOVOMODO: Scable Certificate Validation And Simplified PKI Management
    • S.Micali. NOVOMODO: Scable Certificate Validation And Simplified PKI Management. In 1st Annual PKI Research Workshop, 2002.
    • (2002) 1st Annual PKI Research Workshop
    • Micali, S.1
  • 38
    • 85020598353 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Springer-Verlag
    • A. Shamir. Identity-Based Cryptosystems and Signature Schemes. Crypto 1984, Springer-Verlag, pages 47-53, 1985.
    • (1985) Crypto 1984 , pp. 47-53
    • Shamir, A.1
  • 41
    • 38849142002 scopus 로고    scopus 로고
    • TCPA Group, Alliance. At, 2006
    • TCPA Group. Trusted Computing Platform Alliance. At http://www. trustedcomputinggroup.org, 2006.
    • Trusted Computing Platform
  • 45
    • 47749151686 scopus 로고    scopus 로고
    • Proxy certificate revocation in grid and a practical implementation framework
    • S. Zhao, A. Aggarwal, and R. D. Kent. Proxy certificate revocation in grid and a practical implementation framework. In Proc. 8th ACIS/IEEE SNPD, 2007.
    • (2007) Proc. 8th ACIS/IEEE SNPD
    • Zhao, S.1    Aggarwal, A.2    Kent, R.D.3
  • 46
    • 33645797144 scopus 로고    scopus 로고
    • Tradeoffs in certificate revocation schemes
    • P. Zheng. Tradeoffs in certificate revocation schemes. ACM SIGCOMM Comput. Commun. Rev., 33(2):103-112, 2003.
    • (2003) ACM SIGCOMM Comput. Commun. Rev , vol.33 , Issue.2 , pp. 103-112
    • Zheng, P.1
  • 47
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.