Authentication mechanisms in a control grid computing environment using identity based identification (IBI)
Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the user data from modification can be achieved through...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Published: |
American Scientific Publishers
2017
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/75278/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027892027&doi=10.1166%2fasl.2017.7409&partnerID=40&md5=4d7322747b3ee00e7f80cf4e89a2c840 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|