{"title":"一种新的网格安全认证体系结构","authors":"Mingyuan Yu, Haibo Yang, Ronghua Liang, Yahong Hu","doi":"10.1109/ICCSC.2008.27","DOIUrl":null,"url":null,"abstract":"The grid security infrastructure (GSI) has been accepted as the primary authentication mechanism for the Grid. However the efficiency of the grid system is still required improvement because exchanging certificates and verifying validity are compulsory in the authentication procedure. In this paper, we propose a novel authentication architecture for grid Security (AAGS), which adopts seeded secret key and combine key technique and employs the features of conic curves over the residue class ring Zn into the authentication security, and we give precise definitions of the grid infrastructural protocols for AAGS. Compared with the SAP (SSL Authentication Protocol) in the GSI, AAGS is more efficient and convenient for its implementation, which contributes to the larger grid scalability and may be regarded as an optimized authentication approach of the grid security infrastructure.","PeriodicalId":137660,"journal":{"name":"2008 4th IEEE International Conference on Circuits and Systems for Communications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Novel Authentication Architecture for Grid Security\",\"authors\":\"Mingyuan Yu, Haibo Yang, Ronghua Liang, Yahong Hu\",\"doi\":\"10.1109/ICCSC.2008.27\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The grid security infrastructure (GSI) has been accepted as the primary authentication mechanism for the Grid. However the efficiency of the grid system is still required improvement because exchanging certificates and verifying validity are compulsory in the authentication procedure. In this paper, we propose a novel authentication architecture for grid Security (AAGS), which adopts seeded secret key and combine key technique and employs the features of conic curves over the residue class ring Zn into the authentication security, and we give precise definitions of the grid infrastructural protocols for AAGS. Compared with the SAP (SSL Authentication Protocol) in the GSI, AAGS is more efficient and convenient for its implementation, which contributes to the larger grid scalability and may be regarded as an optimized authentication approach of the grid security infrastructure.\",\"PeriodicalId\":137660,\"journal\":{\"name\":\"2008 4th IEEE International Conference on Circuits and Systems for Communications\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 4th IEEE International Conference on Circuits and Systems for Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSC.2008.27\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 4th IEEE International Conference on Circuits and Systems for Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSC.2008.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Novel Authentication Architecture for Grid Security
The grid security infrastructure (GSI) has been accepted as the primary authentication mechanism for the Grid. However the efficiency of the grid system is still required improvement because exchanging certificates and verifying validity are compulsory in the authentication procedure. In this paper, we propose a novel authentication architecture for grid Security (AAGS), which adopts seeded secret key and combine key technique and employs the features of conic curves over the residue class ring Zn into the authentication security, and we give precise definitions of the grid infrastructural protocols for AAGS. Compared with the SAP (SSL Authentication Protocol) in the GSI, AAGS is more efficient and convenient for its implementation, which contributes to the larger grid scalability and may be regarded as an optimized authentication approach of the grid security infrastructure.