An Identity-Based Grid Security Infrastructure Model
暂无分享,去创建一个
Linpeng Huang | Minglu Li | Lin Chen | Xiaoqin Huang | Minglu Li | Linpeng Huang | Lin Chen | Xiaoqin Huang
[1] Matthew J. B. Robshaw,et al. On Identity-Based Cryptography and Grid Computing , 2004, International Conference on Computational Science.
[2] Morrie Gasser,et al. An architecture for practical delegation in a distributed system , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Liqun Chen,et al. Certification of Public Keys within an Identity Based System , 2002, ISC.
[4] Marc Joye,et al. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.
[5] Carl Kesselman,et al. GSI3: Security for Grid Services , 2003 .
[6] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[7] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[8] John Linn,et al. Generic Security Service Application Program Interface , 1993, RFC.
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] Ian T. Foster,et al. A National-Scale Authentication Infrastructur , 2000, Computer.
[11] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[12] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[13] Ian T. Foster,et al. Security for Grid services , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.
[14] John Linn,et al. Generic Security Service Application Program Interface, Version 2 , 1997, RFC.
[15] Stephen Gilmore,et al. Evaluating the Performance of Skeleton-Based High Level Parallel Programs , 2004, International Conference on Computational Science.
[16] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[17] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[18] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[19] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[20] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.
[21] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[22] Jonathan Armstrong,et al. Introduction to grid computing with globus , 2003 .