Asian Journal of Information Technology

Year: 2013
Volume: 12
Issue: 10
Page No. 318 - 324

Efficient Technique for Authentication and Integrity of Data in Grid Using CSTA

Authors : R. Kalaiselvi and V. Kavitha

References

Guowen, X., X. Shengjun and L. FangFang, 2010. Research of grid security authentication model subtitle as needed. Proceedings of the International Conference on Computer Application and System Modeling, Volume 1, October 22-24, 2010, Taiyuan, China, pp: 78-80.

Hussain, S.A. and K.E.S. Murthy, 2011. Information security by using signature with RSA encryption in grid computing. Int. J. Comput. Inform. Syst., Vol. 3.

Kumari, K.A., G.S. Sadasivam, R.S. Prabha and G. Saranya, 2011. Grid based security framework for online trading. Proceedings of the International Conference on Process Automation, Control and Computing, July 20-22, 2011, Coimbatore, India, pp: 1-4.

Lu, R., Z. Cao, Z. Chai and X. Liang, 2008. A simple user authentication scheme for grid computing. Int. J. Network Security, 7: 202-206.
Direct Link  |  

Mehta, M., 2004. Authentication services in open grid services. Research Project Report, May 7, 2004.

Selvi, R.K. and V. Kavitha, 2012. Crypto system based authentication using CSTA in grid. Int. J. Comput. Appl., 48: 45-51.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved