메뉴 건너뛰기




Volumn 5931 LNCS, Issue , 2009, Pages 157-166

Identity-based authentication for cloud computing

Author keywords

Authentication; Cloud computing; Identity based cryptography

Indexed keywords

AUTHENTICATION PROTOCOLS; CLOUD COMPUTING; COMPLEX SYSTEMS; HIERARCHICAL MODEL; IDENTITY BASED CRYPTOGRAPHY; IDENTITY-BASED; NEW TECHNOLOGIES; SIGNATURE SCHEME; TRUST AND SECURITY;

EID: 71749113079     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10665-1_14     Document Type: Conference Paper
Times cited : (195)

References (17)
  • 1
    • 67650482924 scopus 로고    scopus 로고
    • Cloud Computing: Does Nirvana Hide behind the Nebula?
    • Erdogmus, H.: Cloud Computing: Does Nirvana Hide behind the Nebula? IEEE Software 26(2), 4-6 (2009)
    • (2009) IEEE Software , vol.26 , Issue.2 , pp. 4-6
    • Erdogmus, H.1
  • 2
    • 59849089966 scopus 로고    scopus 로고
    • Leavitt, N.: Is Cloud Computing Really Ready for Prime Time? Computer 42(1), 15-20 (2009)
    • Leavitt, N.: Is Cloud Computing Really Ready for Prime Time? Computer 42(1), 15-20 (2009)
  • 3
    • 84869666300 scopus 로고    scopus 로고
    • Freier, A.O, Karlton, P, Kocher, P.C, The SSL Protocol, Version 3.0.INTERNET-DRAFT November 1996
    • Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol, Version 3.0.INTERNET-DRAFT (November 1996), http://draft-freier-ssl-version3-02.txt
  • 6
    • 34147160569 scopus 로고    scopus 로고
    • A hierarchical modelling and analysis for grid service reliability
    • Dai, Y.S., Pan, Y., Zou, X.K.: A hierarchical modelling and analysis for grid service reliability. IEEE Transactions on Computers 56(5), 681-691 (2007)
    • (2007) IEEE Transactions on Computers , vol.56 , Issue.5 , pp. 681-691
    • Dai, Y.S.1    Pan, Y.2    Zou, X.K.3
  • 7
    • 34547865669 scopus 로고    scopus 로고
    • Performance and Reliability of Tree-Structured Grid Services Considering Data Dependence and Failure Correlation
    • Dai, Y.S., Levitin, G., Trivedi, K.S.: Performance and Reliability of Tree-Structured Grid Services Considering Data Dependence and Failure Correlation. IEEE Transactions on Computers 56(7), 925-936 (2007)
    • (2007) IEEE Transactions on Computers , vol.56 , Issue.7 , pp. 925-936
    • Dai, Y.S.1    Levitin, G.2    Trivedi, K.S.3
  • 8
    • 33745193736 scopus 로고    scopus 로고
    • Reliability and Performance of Tree-structured Grid Services
    • Dai, Y.S., Levitin, G.: Reliability and Performance of Tree-structured Grid Services. IEEE Transactions on Reliability 55(2), 337-349 (2006)
    • (2006) IEEE Transactions on Reliability , vol.55 , Issue.2 , pp. 337-349
    • Dai, Y.S.1    Levitin, G.2
  • 10
    • 43149116953 scopus 로고    scopus 로고
    • Space Efficient Identity Based Encryption without Pairings
    • Boneh, D., Gentry, C., Hamburg, M.: Space Efficient Identity Based Encryption without Pairings. In: Proceedings of FOCS 2007, pp. 647-657 (2007)
    • (2007) Proceedings of FOCS 2007 , pp. 647-657
    • Boneh, D.1    Gentry, C.2    Hamburg, M.3
  • 11
    • 58349086247 scopus 로고    scopus 로고
    • Generalized Identity Based and Broadcast Encryption Schemes
    • Pieprzyk, J, ed, ASIACRYPT 2008, Springer, Heidelberg
    • Boneh, D.: Generalized Identity Based and Broadcast Encryption Schemes. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 455-470. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 455-470
    • Boneh, D.1
  • 12
    • 38049123546 scopus 로고    scopus 로고
    • Boyen, X.: General Ad Hoc Encryption from Exponent Inversion IBE. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, 4515, pp. 394-411. Springer, Heidelberg (2007)
    • Boyen, X.: General Ad Hoc Encryption from Exponent Inversion IBE. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 394-411. Springer, Heidelberg (2007)
  • 13
    • 35048897942 scopus 로고    scopus 로고
    • On Identity- Based. Cryptography and Grid Computing
    • Bubak, M, van Albada, G.D, Sloot, P.M.A, Dongarra, J, eds, ICCS, Springer, Heidelberg
    • Lim, H.W., Robshaw, M.: On Identity- Based. Cryptography and Grid Computing. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 474-477. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3036 , pp. 474-477
    • Lim, H.W.1    Robshaw, M.2
  • 14
    • 24944477518 scopus 로고    scopus 로고
    • Lim, H.W., Robshaw, M.: A dynamic key infrastructure for GRID. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, 3470, pp. 255-264. Springer, Heidelberg (2005)
    • Lim, H.W., Robshaw, M.: A dynamic key infrastructure for GRID. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 255-264. Springer, Heidelberg (2005)
  • 16
    • 0036871428 scopus 로고    scopus 로고
    • GridSim: A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing
    • Buyya, R., Murshed, M.: GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing. Journal of concurrency and computation practice and experience 14(13-15), 1175-1220 (2002)
    • (2002) Journal of concurrency and computation practice and experience , vol.14 , Issue.13-15 , pp. 1175-1220
    • Buyya, R.1    Murshed, M.2
  • 17
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354-368. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.