The GridSite Web/Grid security system

2005 ◽  
Vol 35 (9) ◽  
pp. 827-834 ◽  
Author(s):  
Andrew McNab

2011 ◽  
Vol 63-64 ◽  
pp. 21-24
Author(s):  
You Chan Zhu ◽  
Xiao Fang Zhang

As the development of network the grid will be widely used. To choose a suitable authentication mechanism in a large grid is very important. Identity authentication is one of the important mechanisms that can achieve grid security. It is the first line in the grid applications. It is also a portal in the security system. In the light of the advantages and disadvantages of PKI and ID-PKI, this paper provides a new technology. Presently, PKI and ID-PKI authentication technology is a popular authentication technology. This technology uses the identity certification to reduce the overhead in the domain, and uses CA authentication between domains to guarantee the security of the system.



2010 ◽  
Vol 219 (6) ◽  
pp. 062058 ◽  
Author(s):  
Andrew McNab ◽  
Yibiao Li


Author(s):  
MingChu Li ◽  
Yongrui Cui ◽  
Yuan Tian ◽  
Dong Wang ◽  
Songyuan Yan


Author(s):  
Nong Xiao ◽  
Xiaonian Wu ◽  
Wei Fu ◽  
Xiangli Qu




2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.



Sign in / Sign up

Export Citation Format

Share Document