Authorization within grid-computing using certificateless identity-based proxy signature.
Mohamed Amin JabriSatoshi MatsuokaPublished in: HPDC (2010)
Keyphrases
- grid computing
- proxy signature
- bilinear pairings
- signature scheme
- proxy signature scheme
- access control
- original signer
- signcryption scheme
- designated verifier
- provably secure
- distributed computing
- proxy signer
- key management
- standard model
- security model
- load balancing
- blind signature scheme
- peer to peer
- public key
- resource management
- resource sharing
- security requirements
- blind signature
- private key
- diffie hellman
- public key cryptography
- forward secure
- computing environments
- conflict resolution
- security policies
- digital signature
- security properties
- wireless sensor networks
- key distribution
- digital libraries
- distributed environment
- distributed systems