Designing Grid Security Infrastructures Using Identity-Based Cryptography

Designing Grid Security Infrastructures Using Identity-Based Cryptography

Hoon Wei Lim
ISBN13: 9781615206865|ISBN10: 1615206868|EISBN13: 9781615206872
DOI: 10.4018/978-1-61520-686-5.ch035
Cite Chapter Cite Chapter

MLA

Lim, Hoon Wei. "Designing Grid Security Infrastructures Using Identity-Based Cryptography." Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications, edited by Nick Antonopoulos, et al., IGI Global, 2010, pp. 817-837. https://doi.org/10.4018/978-1-61520-686-5.ch035

APA

Lim, H. W. (2010). Designing Grid Security Infrastructures Using Identity-Based Cryptography. In N. Antonopoulos, G. Exarchakos, M. Li, & A. Liotta (Eds.), Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications (pp. 817-837). IGI Global. https://doi.org/10.4018/978-1-61520-686-5.ch035

Chicago

Lim, Hoon Wei. "Designing Grid Security Infrastructures Using Identity-Based Cryptography." In Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications, edited by Nick Antonopoulos, et al., 817-837. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-61520-686-5.ch035

Export Reference

Mendeley
Favorite

Abstract

Public key infrastructure (PKI) is presently deployed in most grid implementations. Existing PKI-based grid systems make extensive use of public key certificates, both long-term and short-term, in order to support various grid security services, such as single sign-on, mutual authentication and delegation. Orthogonally, the emergence of identity-based cryptography (IBC), which is certificate-free, makes possible more lightweight, simpler public key management techniques than that of conventional certificate-based PKI. In this chapter, the authors study how properties of IBC can be used to design alternative grid security infrastructures which support grid security services in a more clean and natural way.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.