1,807 research outputs found

    Architecture Layer Based Grid Computing Security Study

    Get PDF
    With increasing grid computing application in more and more industries and sectors, grid security has grown into the most critical as well as important aspect in overall application architecture. This article, from architecture layer security dimension, studies security issue in grid computing environments, indicating architecture layer based security solutions in current grid computing and proposing grid security recommendations as well, which will contribute to further defining and analyzing security strategy in grid computing and function as a guideline to the development of grid computing technology. Keywords: grid security infrastructure; security strategy; grid computin

    PKI and Its Applications in E-Commerce in China

    Get PDF
    PKI system supports user authentication, message transmission, data integrity, message storage confidentiality, and the non-repudiation of operation. PKI can completely address e-commerce security requirements and PKI technology has been applied successfully in e-commerce as well. This article studies the system compositions of e-commerce, briefly analyzes e-commerceā€™s applications in various countries, and highlights PKI and its applications in e-commerce in China. Keywords: Public Key Infrastructure; E-commerce; applicatio

    Secure Communication Based on Hyperchaotic Chen System with Time-Delay

    Get PDF
    This research is partially supported by National Natural Science Foundation of China (61172070, 60804040), Fok Ying Tong Education Foundation Young Teacher Foundation(111065), Innovative Research Team of Shaanxi Province(2013KCT-04), The Key Basic Research Fund of Shaanxi Province (2016ZDJC-01), Chao Bai was supported by Excellent Ph.D. research fund (310-252071603) at XAUT.Peer reviewedPostprin

    A Multi-authentication Architecture Based on DIAMETER

    Get PDF
    Comparing two AAA protocols, the authors find that the compatibility of the DIAMETER protocol is better and more advanced than that of the RADIUS protocol. The authors design a security model based on this protocol to conduct network management. The principle of this model is to use the extended features of EAP to force users to update the OS and the virus feature library. Using this model to implement network management can reduce objective threats of end users, reduce spam traffic, increase the payload of the network, and enhance the security of the network
    • ā€¦
    corecore