The Research of Authentication Framework Based on PKI and ID-PKI

Article Preview

Abstract:

As the development of network the grid will be widely used. To choose a suitable authentication mechanism in a large grid is very important. Identity authentication is one of the important mechanisms that can achieve grid security. It is the first line in the grid applications. It is also a portal in the security system. In the light of the advantages and disadvantages of PKI and ID-PKI, this paper provides a new technology. Presently, PKI and ID-PKI authentication technology is a popular authentication technology. This technology uses the identity certification to reduce the overhead in the domain, and uses CA authentication between domains to guarantee the security of the system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

21-24

Citation:

Online since:

June 2011

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Boneh D,Franklin M K.Identity-based encryption from the weil pairing[C] ∥Proceedings of Crypto'01.Berlin: Springer-Verlag, 2001:213-229.

DOI: 10.1007/3-540-44647-8_13

Google Scholar

[2] Meiying Bao. The research of security authentication framework in the grid.[M] North University. (2008)

Google Scholar

[3] Lican Huang,Zhaohui Wu.A PKI-based Scalable Security Infrastructure for Scalable Grid. In Proceeding of 2nd International Workshop on Grid and Cooperative Computing(GCC2003).Shanghai,China.Dec,2003.1051-1054.

DOI: 10.1007/978-3-540-24680-0_166

Google Scholar

[4] Mike Suuridge.A Rough Guide to Grid Security. IT Innovation,2002.

Google Scholar

[5] S Tuecke,V Welch,D Engert et al.Internet X.509 Public Key Infrastructure Proxy Certificate Profile.IETF RFC 3820.2004.

DOI: 10.17487/rfc3820

Google Scholar

[6] Shamir A.Identity-based cryptosystems and signature schemes[C] //Proceedings of CRYPTO'84.Berlin: Springer-Verlag, 1985:47-53.

Google Scholar