Parallel Encryption Technique Combined With Secure Single Sign-On Mechanism for Distributed Computer Networks?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 8)Publication Date: 2013-08-30
Authors : R. Suganya A.K. Sathiya Bama;
Page : 115-119
Keywords : Communication; Dos; Key Distribution; Mobile Devices; User Identification;
Abstract
These security-enhanced communication tools in a wide-area Globus test bed that we are constructing, called GUSTO (Guidance Utilizing Stable Timing Oscillator). This deployment will allow largescale application experiments and hence provide feedback on how our security mechanisms work in practical situations. It seems certain that encryption performance will be a bottleneck in many situations. Hence, we will experiment with various performance enhancement techniques, including specialized protocols, parallel encryption algorithms combined with secure single sign mechanism, and use of dedicated encryption processors. Another interesting direction for further work will be to investigate the feasibility of using the Meta computing Directory Service to determine when secure communication mechanisms must be employed, for example because communication occurs over insecure network connections. Clearly one issue that will be important to address in this context is the authenticity of resource database entries.
Other Latest Articles
- CCLAEEO: CLUSTERING BASED CROSSLAYER AIDED ENERGY-EFFICIENT OPPORTUNISTIC ROUTING SCHEME IN MOBILE AD HOC NETWORKS
- Intelligent Heart Disease Prediction Model Using Classification Algorithms
- Depiction of Routing Protocols in Mobile Adhoc Networks: Behaviour Analysis
- Analysis of Attribute Association Rule from Large Medical Datasets towards Heart Disease Prediction?
- Automated Libraries: What we expect from Digital Libraries
Last modified: 2013-08-24 00:32:45