{"title":"基于网格环境的消息传递安全性研究","authors":"Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee","doi":"10.1109/ICCIT.2009.298","DOIUrl":null,"url":null,"abstract":"Grid computing architecture was defined to be a complete physical layer. The message transfer in network must be in secure. In this study, we propose the encryption algorithm in every grid node to keep information in security. Sender requests key code from receiver grid node, uses this key code to encrypt message to produce cipher text and sends out. Receiver also uses this key code to decrypt cipher text to get original message. This key code is kept in both sides. When these algorithms install in all grid nodes, we can keep message process be secure in the system.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Security of Message Passing Based on Grid Environment\",\"authors\":\"Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee\",\"doi\":\"10.1109/ICCIT.2009.298\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Grid computing architecture was defined to be a complete physical layer. The message transfer in network must be in secure. In this study, we propose the encryption algorithm in every grid node to keep information in security. Sender requests key code from receiver grid node, uses this key code to encrypt message to produce cipher text and sends out. Receiver also uses this key code to decrypt cipher text to get original message. This key code is kept in both sides. When these algorithms install in all grid nodes, we can keep message process be secure in the system.\",\"PeriodicalId\":112416,\"journal\":{\"name\":\"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIT.2009.298\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIT.2009.298","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security of Message Passing Based on Grid Environment
Grid computing architecture was defined to be a complete physical layer. The message transfer in network must be in secure. In this study, we propose the encryption algorithm in every grid node to keep information in security. Sender requests key code from receiver grid node, uses this key code to encrypt message to produce cipher text and sends out. Receiver also uses this key code to decrypt cipher text to get original message. This key code is kept in both sides. When these algorithms install in all grid nodes, we can keep message process be secure in the system.