-
1
RSA authentication mechanisms in control grid computing environment using gridsim toolkit
Published 2015“…There are several approaches has been discussed in the grid computing environment on the safeguard, scalable and efficient authentication that are either Virtual Organization centric or Resource centric. Most of the grid computing uses public key infrastructure (PKI) to secure the identification, but the vulnerability are still cannot be avoid. …”
Get full text
Conference or Workshop Item -
2
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…As such, it is difficult to be assured that our data is in the safe hands.Thus, authentication has become the most critical factor pertaining to this.There are several approaches has been discussed in the grid computing environment on the safeguard, scalable and efficient authentication that are either Virtual Organization centric or Resource centric.Most of the grid computing uses public key infrastructure (PKI) to secure the identification, but the vulnerability are still cannot be avoid. …”
Get full text
Conference or Workshop Item