The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The cloud computing environment enables cloud users to outsource their data into the cloud environment because of its cost efficiency and ease of management. However, by out sourcing the data to the cloud, cloud users lose their control over the data. This situation becomes more critical when using a cell phone and initiating the handoff process. There is a problem when cloud users invalidate some...
As broad adoption of Apache Hadoop [20] accelerates authentication and authorization capabilities are a major concern for data access security. To integrate pluggable authentication providers, enhance desirable single sign on for end users, and enforce centralized access control on the platform, Hadoop community has widely discussed and concluded that token based authentication is the appropriate...
Federated policy systems are required to support the emergent complexity and organizational heterogeneity of modern Internet service delivery. This paper presents a distributed policy management approach which utilizes a flexible, tree-based capability authority model to partition and delegate federated capabilities or services. A trust management model and a delegation logic is defined which supports...
Federated policy systems are required to support the complexity and organizational heterogeneity of the modern marketplace. The Community-based Policy Management System (CBPMS) is such a distributed policy management approach. It utilizes a tree-based capability authority model to partition and delegate federated capabilities. However CBPMS delegation chains have limitations such as: performance overheads...
With the expansion and the convergence of computing and communication, the dynamic provisioning of customized processing and networking infrastructures as well as resource virtualization are appealing concepts and technologies. Therefore, new models and tools are needed to allow users to create, trust and exploit such on-demand virtual infrastructures within wide area distributed environments. This...
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit costs are directly tied to the business operations to which they contribute. While creating a fine-grained operating cost model is very important for software solutions such as SaaS, the anticipated technology platforms...
With the development of computer and network technology, digital signature techniques are being expanded greatly, from single signature and single verification techniques to multisignature ones. This paper presents a new chain verification signature scheme, which does not grant verifier Pn to verify the validity of the signature until being authorized by members P1, P2,......,Pn-1 of the chain verification...
As grid??s dynamic, distributed and open nature, the issue of mutual trust among grid entities is challenging, not only because of the entities in different domains, but also because the fact that those domains may deploy different security mechanisms. A federal authentication and authorization scheme based upon trust management and delegation is proposed. Different security domains can join in the...
Proxy authorization signature is essential to electronic commerce and other electronic transaction. This paper analyzed the security threats of present proxy authorization signatures and the basic principles of proxy signature together with its superiority in electronic transaction application. We present a conditionally anonymous proxy authorization signature scheme with forward security. The identity...
The paper introduces the structure of the EPC network, analyzes the potential security problems of the EPC network information service (EPCIS). Expatiates the light PKI EPCIS trust model based on PKI, the proposed light PKI trust architecture is much simpler and efficient. Put forward a based on the enterprise trust and collaboration model (ETCM) and the search algorithm of the trust corporate relations...
Nenadic etc(2004,2005) proposed RSA-CEGD protocol for certified e-goods delivery to guarantee strong fairness with the help of transparent Semi-Trust Third Party. Alcaide, Juan, etc(2005) pointed out it is vulnerable for replay attack and the NRO message can be abused. In this paper, we illustrate the STTP can not verify the message submitted by initiator which results in unfairness. In order to implement...
Real E-business system has some vulnerable facts like denial of service; unavailability of distributed certificates and also creates inconsistency policy by independent stakeholders these leads to enhance the domain by converging PKI-based security services. The proposed system makes use of an existing e-business infrastructure and adds security services such as access control, authentication management...
Ubiquitous computing systems typically have lots of security problems in the area of service supply. The service types and levels, the security delegation of services and the identity hiding of principal etc are all these unsolved problems. In this paper, UCSMssp, a new novel ubiquitous computing service model based on SPKI/SDSI and P2P is presented. SPKI-based authorization is exploited in UCSMssp...
With the trend of networking and the growth of data value, networked storage security becomes hotpot of research. Aiming at the scalability and security requirement of massive storage system, we proposed a security storage service model combining storage mechanism and security policy and designed a set of scalable third-party security protocols. The protocols adopt public-key cryptography to guarantee...
In order to encapsulate data and to convey information more efficiently and more security, a draft frame based on active block ciphers for application layer of Internet which could transmit orange data into semantic security and semantic integrity was designed according to scalable purpose. To different network environment, there were different intelligent choices about block cipher algorithms to...
Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We proposed a new model, P2P-NetPay, a micro-payment protocol characterized by off-line processing, suitable for peer-to-peer network service charging. P2P micro-payment systems must provide a secure, highly efficient, flexible, usable and...
In this paper, we propose a new efficient identity based proxy signature scheme. Compared with the previously proposed proxy signature schemes, ours combines the properties of proxy signature and the identity based signature, and has much more advantages than the traditional proxy signature schemes without the identity based characteristic. In addition, we also modify the general scheme into an extensive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.