A dependable model for attaining maximum authetication security procedure in a grid based environment
dc.contributor.author | Azeez, Nureni A. | |
dc.contributor.author | Abidoye, Ademola P. | |
dc.contributor.author | Agbele, Kehinde K. | |
dc.contributor.author | Adesina, Ademola Olusola | |
dc.date.accessioned | 2014-02-26T14:25:44Z | |
dc.date.available | 2014-02-26T14:25:44Z | |
dc.date.issued | 2012 | |
dc.description.abstract | Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-α-vis strict adherence to security policies and protocols. | en_US |
dc.identifier.citation | Azeez, N.A., et al. (2012). A dependable model for attaining maximum authetication security procedure in a grid based environment. Trends in Applied Sciences Research, 7 (1): 78-86 | en_US |
dc.identifier.issn | 1819-3579 | |
dc.identifier.uri | http://hdl.handle.net/10566/1046 | |
dc.language.iso | en | en_US |
dc.privacy.showsubmitter | FALSE | |
dc.publisher | Academic Journals Inc. | en_US |
dc.rights | © 2012 Academic Journals Inc. This file may be freely used provided that the source is acknowledged. No commercial distribution of this text is permitted. | |
dc.source.uri | http://dx.doi.org/10.3923/tasr.2012.78.86 | |
dc.status.ispeerreviewed | TRUE | |
dc.subject | Grid | en_US |
dc.subject | Security | en_US |
dc.subject | Model | en_US |
dc.subject | Authentication | en_US |
dc.subject | Double authentication | en_US |
dc.subject | Encryption | en_US |
dc.title | A dependable model for attaining maximum authetication security procedure in a grid based environment | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- AzeezAuthenticationSecurity2012.pdf
- Size:
- 269.58 KB
- Format:
- Adobe Portable Document Format
- Description:
- Published version
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.55 KB
- Format:
- Item-specific license agreed upon to submission
- Description: