Skip to main content

Processing Certificate of Authorization with Watermark Based on Grid Environment

  • Conference paper
Computational Collective Intelligence. Technologies and Applications (ICCCI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6422))

Included in the following conference series:

  • 1051 Accesses

Abstract

Based on the grid computing architecture, we divided grid nodes into supervisor grid node and execute grid nod. In this study, we propose the safe treatment of the certificate of authorization in this article. Both of the owner and grantee keep the certificate of authorization. We insert the watermark in the certificate of authorization to be one file. We set encryption data table and use it to encrypt the file with different key to produce the files of cipher text. Both of the owner and grantee keep their files. We create certificate information database in supervisor grid node. When both sides want to confirm, we use their keys stored in supervisor grid node to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The steps that the certificate of authorization is encrypted and decrypted will be safer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystem. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991)

    Google Scholar 

  2. Biham, E., Shamir, A.: A Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)

    Book  MATH  Google Scholar 

  3. Biham, E., Shamir, A.: Differential Cryptanalysis of Data Encryption Standard. Springer, Berlin (1993)

    Book  MATH  Google Scholar 

  4. Chen, H.-S., Lee, T.-Y., Lee, H.-M.: Collect and broadcast news in security. In: Proceedings of 2nd International Conference on Interaction Science: Information Technology, Culture and Human. ACM international Conference Processing Series, vol. 403, pp. 912–917 (2009)

    Google Scholar 

  5. Foster, I., Kesselman, C.: Globus: A Metacomputing Infrastructure Toolkit. International Journal of Supercomputer Application 11(2), 115–128 (1997)

    Google Scholar 

  6. Foster, I., Kesselman, C., Tuecke, S.: GRAM: Key concept (July 31, 1998), http://www-unix.globus.org/toolkit/docs/3.2/gram/key/index.html

  7. Lee, H.-M., Lee, T.-Y., Hsu, M.-H.: A Process Schedule Analyzing Model Based on Grid Environment. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds.) KES 2006. LNCS (LNAI), vol. 4253, pp. 938–947. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Lee, T.-Y., Lee, H.-M.: Encryption and Decryption Algorithm of Data Transmission in Network Security. WSEAS Transactions on Information Science and Applications 12(3), 2557–2562 (2006)

    Google Scholar 

  9. McEliece, R.J.: A Public-Key System Based on Algebraic Coding Theory, 114-116. Deep Sace Network Progress Report, 44, Jet Propulsion Laboratory, California Institute of Technology (1978)

    Google Scholar 

  10. Miyaguchi, S.: The FEAL-8 Cryptosystem and Call for Attack. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 624–627. Springer, Heidelberg (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, HS., Lee, TY., Lee, HM. (2010). Processing Certificate of Authorization with Watermark Based on Grid Environment. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2010. Lecture Notes in Computer Science(), vol 6422. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16732-4_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16732-4_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16731-7

  • Online ISBN: 978-3-642-16732-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics