A Flexible Method Using Identity Based Message Key Distribution for Securing Workflow Signatures
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: The increase in advancement of information technology led the migration of workflows from paper based to electronic workflow systems. Basically a workflow consists of a number of tasks and each of these tasks should be authenticated by using any of the cryptographic techniques. To provide more security within workflow systems, signing keys are used. In addition to data authenticity and integrity, logical relationships such as AND-join and AND-split are to be provided in a workflow signature scheme. Such a scheme was experimentally proven which is based on hierarchical identity-based cryptography to meet security properties required by inter-organizational workflows. Due its high complexity, a new mechanism, IB-MKD (Identity Based Message Key Distribution) is proposed as an alternative to HIBS, which is achieved with conventional RSA without any additional assumptions and limitations and it is believed to have less overhead.
Authors and Affiliations
Roshin Sharo Eapen
Lip Recognition for Authentication and Security
Abstract: Lip is used as an identifier from person to person as the size of the upper and lower lips, furrows, grooves, the distances between the lines and the edges vary individualistically. These unique parameter...
Integration of PDM and ERP systems within a unified information space of an enterprise
This article focuses on the research on the complex processes of joint integration of PDM and ERP systems. The relevance of introducing an integrated system within a single information space is justified. The main challe...
A Non Conventional Energy Based Mobile Charger towards Green Computing
Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twi...
CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topi...
A Review of DOS Attacks in Cloud Computing
Abstract: Cloud computing is an emerging trend in the field of IT providing scalable and flexible services to the end users on demand. Cloud offers services in three levels namely infrastructure, platform and software to...