Authentication mechanisms in a control grid computing environment using identity based identification (IBI)

Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the user data from modification can be achieved through...

Full description

Saved in:
Bibliographic Details
Main Authors: Ismail, S. A., Ngadi, M. A., Sharif, J. M., Kama, M. N.
Format: Article
Published: American Scientific Publishers 2017
Subjects:
Online Access:http://eprints.utm.my/id/eprint/75278/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027892027&doi=10.1166%2fasl.2017.7409&partnerID=40&md5=4d7322747b3ee00e7f80cf4e89a2c840
Tags: Add Tag
No Tags, Be the first to tag this record!