Skip to main content

XML-Based Security Acceleration Methods Supporting Fast Mobile Grid

  • Conference paper
  • 1617 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3590))

Abstract

Mobile grid, or wireless grid services refers to value-added grid service by processing in mobile environment. Besides mobile internet the traditional Internet computing is experiencing a conceptual shift from client-server model to grid and peer-to-peer computing models. As these trends, mobile internet and the grid, are likely to find each other the resource constraints that wireless devices pose today affect the level of interoperability between them. The goal of this paper is to investigate how well the most limited wireless devices can make use of grid security services. This paper describes a novel security approach on fast mobile grid services based on current mobile web services platform environment using XML signcryption mechanism.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tuisku, M.: Wireless Java-enabled MIDP Devices as peers in Grid Infrastructure. Helsinki Institute of Physics. CERN

    Google Scholar 

  2. Wen, Y.: Mobile Grid Major Area Examination. University of California (2002)

    Google Scholar 

  3. Faldella, E., Prandini, M.: A Novel Approach to On-Line Status Authentication of Public Key Certificates. In: Proc. the 16th Annual Computer Security Applications Conference (2000)

    Google Scholar 

  4. Nakamur, Y., et al.: Toward the Integration of web services security on enterprise environments. In: IEEE SAINT 2002 (2002)

    Google Scholar 

  5. Berbecaru, D., Lioy, A.: Towards Simplifying PKI Implementation, Client-Server based Validation of Public Key Certificates. In: IEEE ISSPIT, pp. 277–281 (2002)

    Google Scholar 

  6. Baek, J., et al.: Formal Proofs for the security of signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 80–98. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Zheng, Y.: Digital signcryption or How to Achieve Cost(Signature & Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Google Scholar 

  8. Baek, J.H., et al.: An Efficient Two-Step Paging Strategy Using Base Station Paging Agents in Mobile Communication Networks. ETRI Journal 26(5), 493–496 (2004)

    Article  Google Scholar 

  9. Proposed Fedral Information Proceeding standard for Digital Signature Standard(DSS), Fedral Register. vol. 56 (1991)

    Google Scholar 

  10. Bao, F., Deng, H.: A Signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55–59. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  11. Shin, E.S., et al.: Determination of the Optimal Access Charge for the Mobile Virtual Network Operator System. ETRI Journal 26(6), 665–668 (2004)

    Article  Google Scholar 

  12. Zheng, Y., et al.: Research on Software-based XML Signature Acceleration. Project of ETRI 1, 22–35 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, N., Moon, K., Kim, H., Kim, S., Won, D. (2005). XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. In: Bauknecht, K., Pröll, B., Werthner, H. (eds) E-Commerce and Web Technologies. EC-Web 2005. Lecture Notes in Computer Science, vol 3590. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11545163_32

Download citation

  • DOI: https://doi.org/10.1007/11545163_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28467-3

  • Online ISBN: 978-3-540-31736-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics