2008
DOI: 10.1109/msp.2008.19
|View full text |Cite
|
Sign up to set email alerts
|

Securing Information Transfer in Distributed Computing Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2012
2012

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Access to data is mediated by a Trust Authority that checks for compliance to policies in order to release decryption keys. Strong enforcement of such policies is still research in progress that typically requires trusted infrastructure [59,60].…”
Section: Additional Accountability Mechanismsmentioning
confidence: 99%
“…Access to data is mediated by a Trust Authority that checks for compliance to policies in order to release decryption keys. Strong enforcement of such policies is still research in progress that typically requires trusted infrastructure [59,60].…”
Section: Additional Accountability Mechanismsmentioning
confidence: 99%
“…User first authenticate and submit their request to the authenticator. Authenticator capture the valid credential as the long term credential which consists of private and public key [3]. 2.…”
Section: Grid Working Modelmentioning
confidence: 99%