Paper Title:
The Research of Authentication Framework Based on PKI and ID-PKI
  Abstract

As the development of network the grid will be widely used. To choose a suitable authentication mechanism in a large grid is very important. Identity authentication is one of the important mechanisms that can achieve grid security. It is the first line in the grid applications. It is also a portal in the security system. In the light of the advantages and disadvantages of PKI and ID-PKI, this paper provides a new technology. Presently, PKI and ID-PKI authentication technology is a popular authentication technology. This technology uses the identity certification to reduce the overhead in the domain, and uses CA authentication between domains to guarantee the security of the system.

  Info
Periodical
Edited by
Helen Zhang and David Jin
Pages
21-24
DOI
10.4028/www.scientific.net/AMM.63-64.21
Citation
Y. C. Zhu, X. F. Zhang, "The Research of Authentication Framework Based on PKI and ID-PKI", Applied Mechanics and Materials, Vols. 63-64, pp. 21-24, 2011
Online since
June 2011
Keywords
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Li Juan Zheng, Hong Wei Wang, Pei Yin
Abstract:In this paper, the related concepts of fingerprint recognition technology and PKI are introduced at first. In the traditional identity...
214
Authors: Ya Kun Zhang, Jia Yin Tian, Cheng Yang, Yi Chun Zhang, Fang Tian Hou
Chapter 6: Advance in Inorganic Materials
Abstract:Public Key Infrastructure (PKI) based or Identity-based Encryption (IBE) based authentication schemes are introduced into network storage...
791
Authors: Zhen Zhong Wang, Yao Wang
Chapter 6: Communication and Network
Abstract:In view of the actual application of the status quo of the current digital campus universities, a unified campus authentication systems and...
1086
Authors: Guang Cong Liu, Yuan Jie Shi, Cong Li
Chapter 15: Information Security Technology
Abstract:Certificateless Public Key Cryptography (CL-PKC) overcomes not only the key escrow problem in public key cryptography but also the cost of...
3047
Authors: Yu Wang, Yong Li Wang
Chapter 6: Information Technologies, Computer Networks and Communication Technology in Automation
Abstract:The virtual cable television network is a cable television system with virtual assets, users in the network may have different authentication...
717