Please use this identifier to cite or link to this item:
|Title:||A dependable model for attaining maximum authetication security procedure in a grid based environment|
|Authors:||Azeez, Nureni A.|
Abidoye, Ademola P.
Agbele, Kehinde K.
Adesina, Ademola O.
|Publisher:||Academic Journals Inc.|
|Citation:||Azeez, N. A., Abidoye, A. P., Agbele, K. K., & Adesina, A. O. (2012). A dependable model for attaining maximum authetication security procedure in a grid based environment.|
|Abstract:||Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-a-vis strict adherence to security policies and protocols.|
|Appears in Collections:||Research Articles|
Files in This Item:
|A dependable model for attaining maximum authetication security procedure in a grid based environment.pdf||Article Full- Text||269.58 kB||Adobe PDF|
Items in EUSpace are protected by copyright, with all rights reserved, unless otherwise indicated.