中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 会议论文
Title:
an identity-based authentication scheme in cloud computing
Author: Zhang Zhi-Hua ; Jiang Xue-Feng ; Li Jian-Jun ; Jiang Wei
Source: Proceedings of the 2012 International Conference on Industrial Control and Electronics Engineering, ICICEE 2012
Conference Name: 2012 International Conference on Industrial Control and Electronics Engineering, ICICEE 2012
Conference Date: August 23, 2012 - August 25, 2012
Issued Date: 2012
Conference Place: Xi'an, China
Keyword: Cloud computing ; Communication ; Electronic commerce ; Electronics engineering
Indexed Type: EI
ISBN: 9780769547923
Department: (1) China Tobacco Zhejiang Industrial Co.Ltd. Hangzhou 310009 China; (2) College of Computer Science Beijing University of Technology Beijing 100124 China; (3) Key Laboratory of Information and Network Security 3rd Research Institute Ministry of Public Security Shanghai 201204 China; (4) State Key Laboratory of Information Security (Institute of Software Chinese Academy of Sciences) Beijing 100049 China
Sponsorship: Xi'an Technological University; Missouri Western State University; IEEE Kansas City Section
Abstract: Cloud computing is a hot topic of current research, and identity-based authentication is important in many applications scenarios of e-business based on cloud computing, in these e-business scenarios users should prove the user's legacy, and the enterprise needs to determine whether the user has the right popedom, so this paper presents a identity-based authentication scheme for this applications, and this scheme avoids the issues how to revocation public key certificate and the escrow problem of key, and then the security of the scheme is analyzed, at last the communication process of the identity-based authentication scheme is described. © 2012 IEEE.
English Abstract: Cloud computing is a hot topic of current research, and identity-based authentication is important in many applications scenarios of e-business based on cloud computing, in these e-business scenarios users should prove the user's legacy, and the enterprise needs to determine whether the user has the right popedom, so this paper presents a identity-based authentication scheme for this applications, and this scheme avoids the issues how to revocation public key certificate and the escrow problem of key, and then the security of the scheme is analyzed, at last the communication process of the identity-based authentication scheme is described. © 2012 IEEE.
Language: 英语
Content Type: 会议论文
URI: http://ir.iscas.ac.cn/handle/311060/15872
Appears in Collections:软件所图书馆_会议论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Zhang Zhi-Hua,Jiang Xue-Feng,Li Jian-Jun,et al. an identity-based authentication scheme in cloud computing[C]. 见:2012 International Conference on Industrial Control and Electronics Engineering, ICICEE 2012. Xi'an, China. August 23, 2012 - August 25, 2012.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Zhang Zhi-Hua]'s Articles
[Jiang Xue-Feng]'s Articles
[Li Jian-Jun]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Zhang Zhi-Hua]‘s Articles
[Jiang Xue-Feng]‘s Articles
[Li Jian-Jun]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace