Asian Journal of Information Technology
Year:
2013
Volume:
12
Issue:
10
Page No.
318 - 324
Efficient Technique for Authentication and Integrity of Data in Grid Using
CSTA
Authors :
R. Kalaiselvi
and
V. Kavitha
References
Guowen, X., X. Shengjun and L. FangFang, 2010. Research of grid security authentication model subtitle as needed. Proceedings of the International Conference on Computer Application and System Modeling, Volume 1, October 22-24, 2010, Taiyuan, China, pp: 78-80.
Hussain, S.A. and K.E.S. Murthy, 2011. Information security by using signature with RSA encryption in grid computing. Int. J. Comput. Inform. Syst., Vol. 3.
Kumari, K.A., G.S. Sadasivam, R.S. Prabha and G. Saranya, 2011. Grid based security framework for online trading. Proceedings of the International Conference on Process Automation, Control and Computing, July 20-22, 2011, Coimbatore, India, pp: 1-4.
Lu, R., Z. Cao, Z. Chai and X. Liang, 2008. A simple user authentication scheme for grid computing. Int. J. Network Security, 7: 202-206.
Direct Link | Mehta, M., 2004. Authentication services in open grid services. Research Project Report, May 7, 2004.
Selvi, R.K. and V. Kavitha, 2012. Crypto system based authentication using CSTA in grid. Int. J. Comput. Appl., 48: 45-51.