Research on User Authentication for Grid Computing Security.
Ronghui WuRenfa LiFei YuGuangxue YueCheng XuPublished in: SKG (2006)
Keyphrases
- user authentication
- grid computing
- information security
- distributed computing
- authentication scheme
- authentication systems
- load balancing
- security analysis
- resource management
- authentication protocol
- peer to peer
- grid environment
- biometric systems
- keystroke dynamics
- computing environments
- security issues
- biometric authentication
- smart card
- intrusion detection
- databases
- data mining
- e government
- security requirements
- network security