English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21664649      Online Users : 504
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/4275


    Title: A Study of Dynamic Delegation in Grids
    Authors: Ming-Tsun Lin
    Contributors: Department of Computer Science and Information Engineering
    Keywords: Dynamic delegation;Grid computing security;Hash tree;Proxy signature;Certificate revocation
    Date: 2009
    Issue Date: 2009-11-18 13:14:50 (UTC+0)
    Publisher: Asia University
    Abstract: GSI (Grid Security Infrastructure) provides the security in grids that it is using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using CRL (Certificate Revocation List) and the other is giving the certificate a short period of validity. However, when lots of certifications will be revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. Furthermore, according to the requirements of delegation, proxy certificate has a shortcoming. The proxy certificate holder can not issue his own identity, and prove that he is a legal entity. Therefore, this scheme can not satisfy the security requirements of nonrepudiation and known signer in grids. In this thesis, we propose two schemes to solve proxy certificate revocation and the security requirements of nonrepudiation and known signer in grids. (1) Using proxy signature can satisfy nonrepudiation and known signer. Therefore, our scheme can more efficient and flexible for delegation in grids. (2) Using hash tree for proxy certificate revocation. Our scheme only compares hash values, to achieve the purpose of certificate revocation. Previous two schemes have to wait the expiration of the certificate.
    Appears in Collections:[資訊工程學系] 博碩士論文

    Files in This Item:

    File SizeFormat
    0KbUnknown336View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback