Show simple item record

dc.contributor.authorAzeez, Nureni A.
dc.contributor.authorAbidoye, Ademola P.
dc.contributor.authorAgbele, Kehinde K.
dc.contributor.authorAdesina, Ademola Olusola
dc.date.accessioned2014-02-26T14:25:44Z
dc.date.available2014-02-26T14:25:44Z
dc.date.issued2012
dc.identifier.citationAzeez, N.A., et al. (2012). A dependable model for attaining maximum authetication security procedure in a grid based environment. Trends in Applied Sciences Research, 7 (1): 78-86en_US
dc.identifier.issn1819-3579
dc.identifier.urihttp://hdl.handle.net/10566/1046
dc.description.abstractGrid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-α-vis strict adherence to security policies and protocols.en_US
dc.language.isoenen_US
dc.publisherAcademic Journals Inc.en_US
dc.rights© 2012 Academic Journals Inc. This file may be freely used provided that the source is acknowledged. No commercial distribution of this text is permitted.
dc.source.urihttp://dx.doi.org/10.3923/tasr.2012.78.86
dc.subjectGriden_US
dc.subjectSecurityen_US
dc.subjectModelen_US
dc.subjectAuthenticationen_US
dc.subjectDouble authenticationen_US
dc.subjectEncryptionen_US
dc.titleA dependable model for attaining maximum authetication security procedure in a grid based environmenten_US
dc.typeArticleen_US
dc.privacy.showsubmitterFALSE
dc.status.ispeerreviewedTRUE


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record