Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2014, International Journal of Security, Privacy and Trust Management
…
11 pages
1 file
The grid computing coordinates resource sharing between different administrative domains in large scale, dynamic, and heterogeneous environment. Efficient and secure certificateless public key cryptography (CL-PKC) based authentication protocol for multi-domain grid environment is widely acknowledged as a challenging issue. Trust relationships management across domains is the main objective of authentication protocols in real grid computing environments. In this paper, we discuss the grid pairing-free certificateless two-party authenticated key agreement (GPC-AKA) protocol. Then, we provide a cross domain trust model for GPC-AKA protocol in grid computing environment. Moreover, we analysis the GPC-AKA protocol in multiple trust domains simulated environment using GridSim toolkit.
International Journal of Security, Privacy and Trust Management, 2014
The predominant grid authentication mechanisms use public key infrastructure (PKI). Nonetheless, certificate-less public key cryptography (CL-PKC) has several advantages that seem to well align with the demands of grid computing. Security and efficiency are the main objectives of grid authentication protocols. Unfortunately, certificate-less authenticated key agreement protocols rely on the bilinear pairing, that is extremely computational expensive. In this paper, we analyze the recently secure certificateless key agreement protocols without pairing. We then propose a novel grid pairing-free certificate-less two-party authenticated key agreement (GPC-AKA) protocol, providing a more lightweight key management approach for grid users. We also show, a GPC-AKA security protocol proof using formal automated security analysis Sycther tool.
2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), 2014
The most prevalent grid security standard, grid security infrastructure uses an authentication protocol based on public key infrastructure (PKI). Certificateless public key cryptography (CL-PKC) overcomes PKI certificate management problems and is well aligned with grid computing demands. Security and efficiency are the main grid authentication protocol objectives. Practical, efficient CL-PKC-based authentication protocols for real grid environments is widely acknowledged as a challenging issue. Unfortunately, certificateless authenticated key agreement protocols rely on bilinear pairings, which are extremely computational expensive. In this paper, we present a novel pairing-free certificateless two-party authenticated grid key agreement (GPC-AKA) protocol, providing a lighter weight key management approach for grid users. We then propose the first practical GPC-AKA implementation as a proof of concept. We also compare the efficiency of GPC-AKA to other proposed work in the literature.
Grid computing allows sharing of services and resources distributed over geographically dispersed, heterogeneous, autonomous administrative domains. As a domain generally has no idea about the trustworthiness of other domains, it may hesitate in accessing shared services and resources provided by other domains. Accessing resources and services from untrusted domains may pose dangerous consequences to the source domain. Trust is an important parameter in achieving faithful domain to domain interaction. Domains must be able to determine the trustworthiness of each other for the access of a particular service. Domains must also provide trust based access to resources and services that they expose in the environment. This paper describes different facets associated with trust issues among different entities in a grid environment and proposes a trust model to establish and manage trust relationships. The trust model provides support to calculate direct as well as recommended trust. Based on this model, a trust based authorization framework is proposed that can be used to provide trust based access to grid services. The goal of the model is to encourage trust based domain to domain interaction and increase the confidence of domains in accessing shared resources provided by other domains. The framework has been implemented in .NET environment with the support of WSE 3.0 toolkit. The framework has been evaluated by implementing a scenario that involves enforcement of different trust policies. The time taken by the enforcement component to evaluate trust policies has been noted. The results obtained from the implementation imply that the approach is workable and can be used to provide trust based access to grid services.
Journal of Grid Computing, 2005
Trusted Grid computing demands robust resource allocation with security assurance at all resource sites. Large-scale Grid applications are being hindered by lack of security assurance from remote resource sites. We developed a security-binding scheme through site reputation assessment and trust integration across Grid sites. We do not treat the trust factor deterministically. Instead, we apply fuzzy theory to handle the fuzziness or uncertainties behind all trust attributes. The binding is achieved by periodic exchange of site security information and matchmaking to satisfy user job demands. PKI-based trust model supports Grids in multi-site authentication and single sign-on operations. However, cross certificates are inadequate to assess local security conditions at Grid sites. We propose a new fuzzy-logic trust model for distributed trust aggregation through fuzzification and integration of security attributes. We introduce the trust index of a Grid site, which is determined by site reputation from its track record and self-defense capability attributed to the risk conditions and hardware and software defenses deployed at a Grid site. A Secure Grid Outsourcing (SeGO) system is designed for secure scheduling a large number of autonomous and indivisible jobs to Grid sites. Significant performance gains are observed after trust aggregation, which is evaluated by running scalable NAS and PSA workloads over simulated Grids. Our security-binding scheme scales well with increasing user jobs and Grid sites. The new scheme can guide the security upgrade of Grid sites and predict the Grid performance of large workloads under risky conditions.
Password-based authentication is still the most widelyused authentication mechanism, largely because of the ease with which it can be understood by end users and implemented. In this paper, we propose a security infrastructure for grid applications, in which users are authenticated using passwords. Our infrastructure allows users to perform single sign-on based only on passwords, without requiring a public key infrastructure. Nevertheless, our infrastructure supports essential grid security services, such as mutual authentication and delegation, using public key cryptographic techniques. Moreover, hosting servers in our infrastructure are not required to have public key certificates, meaning mutual authentication and delegation of proxy credentials can be performed in a lightweight and efficient manner.
2012 International Conference on Engineering and Technology (ICET), 2012
For the reason that grid resources are valuable, access is usually limited, based on the requested resource and the requesting user's identity. Authentication in distributed systems like grid computing environment is the first defense line before other security aspects; authorization, confidentiality, integrity and auditing. The main grid authentication mechanisms challenges are single sign-on, secure credential repositories, and cross-domain authentication. This paper presents a comparative study of various authentication mechanisms in grid computing environment to investigate their pros and cons. Such analysis is particularly relevant for those seeking an intensive assessment to appropriate grid authentication mechanisms.
2010 5th International Symposium on Telecommunications, 2010
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to these members. Identity-based secret public keys have some attractive properties which seem to align well with the demands of grid computing. In this Paper, we proposed identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or Diffie-Hellman keys. We examine identity-based secret public key protocols and give informal security analyses which show that they may well be secure against online password guessing and other attacks. More importantly, we present an identity-based secret public key version of the standard TLS protocol. Our new protocol allows passwords to be tied directly to the establishment of secure TLS channels.
Journal of Agriculture, Food Systems, and Community Development , 2019
We are currently facing myriad socio-ecological crises, from global climate change to resource depletion to the loss of dozens of species every day. Despite a longstanding and impassioned environmental movement, these problems persist and are worsening. The extent and degree of human-induced change on the planet is significant enough to have placed us in a new geological age: the Anthropocene. Three perspectives are engaged as a way to understand this new era and address our fractured human-nature relationship: (1) political ecology, (2) the ecological humanities, and (3) the informal economy. An exploration of intersecting themes leads to the start of a new theoretical contribution, which manifests at the convergence of theories: a "whole-of-community" approach. This whole-of-community approach is one that is concerned with both inter-human and interspecies relationships to move us towards communities that are place-based, integrated, participatory, and grounded in eco-social justice and equity. Pollinating bees are used as an illustrative example of how to achieve this vision. Bees can be both a bridge and gateway. As a bridge, they can provide a way of (re)connecting human and nonhuman nature and as a gateway, they can guide humans to a deeper understanding and connection with urban natures. Reconciling humans with the rest of the biotic community through place-based initiatives is possible by fundamentally and radically expanding our current framing of the concept of community.
I. PENGERTIAN HUKUM AGRARIA MENURUT BEBERAPA AHLI LUAR DAN DALAM Dari berbagai literatur kita menemukan beragam definisi mengenai hukum. Boleh dikatakan bahwa belum ditemukan rumusan yang baku terkait definisi hukum. Namun demikian, tidaklah salah bila kita melihat pendapat dari sejumlah pakar yang memberikan pendapat mereka untuk mendefinisikan hukum demi memperkaya wawasan dan pemahaman kita mengenai hukum. Von Savigny melihat hukum dari perspektif sejarah adanya hukum. Menurutnya, Das Recht wird nich gemacht, es ist und wird mit dem Volke (hukum tidak dibuat, ia ada dan menyatu dengan bangsa). Itu artinya, hukum berakar pada sejarah manusia sehingga dihidupkan oleh kesadaran, keyakinan, dan kebiasaan warga masyarakat bangsa. Berbeda dengan Savigny, Gustav Radburch melihat hukum dari perspektif budaya. Radburch mengatakan bahwa hukum itu merupakan suatu unsur budaya yang tentunya harus mewujudkan salah satu nilai dalam kehidupan konkret manusia sebagaimana unsur-unsur budaya lainnya. Nilai yang dimaksud adalah keadilan. Hukum haruslah suatu perwujudan keadilan atau sekurang-kurangnya merupakan usaha ke arah terwujudnya keadilan. Kemudian, Padmo Wahyono lebih melihat hukum sebagai sarana (tool) dengan membatasi hukum sebagai alat atau sarana untuk menyelenggarakan kehidupan negara atau ketertiban dan sekaligus merupakan sarana untuk menyelenggarakan kesejahteraan sosial. Selain kedua pakar tersebut, beberapa pakar lebih melihat hukum dari karakteristiknya. Hans Kelsen, misalnya, melihat hukum sebagai suatu perintah memaksa terhadap perilaku manusia. Hukum merupakan norma primer yang menetapkan sanksi-sanksi. Menurut, Simorangkir dan Sastropranoto, hukum merupakan peraturan-peraturan yang bersifat memaksa, yang menentukan tingkah laku manusia dalam lingkungan masyarakat yang dibuat oleh badan-badan resmi yang berwajib, pelanggaran mana terhadap peraturan-peraturan tadi berakibat diambilnya tindakan, yaitu dengan hukuman tertentu. Pengertian hukum yang lebih prosedural implementatif dikemukakan oleh Utrecht dan Mochtar Kusumaatmadja. Hukum dirumuskan Utrecht sebagai himpunan peraturan (baik berupa perintah maupun larangan) yang mengatur tata tertib dalam suatu masyarakat dan seharusnya ditaati oleh anggota masyarakat yang bersangkutan. Oleh karena itu, pelanggaran petunjuk hidup tersebut dapat menimbulkan tindakan dari pihak pemerintah. Sementara itu, menurut Mochtar Kusumaatmadja, hukum merupakan keseluruhan asas-asas dan kaidah-kaidah yang mengatur kehidupan manusia dalam 1
20. YÜZYILDA SAVAŞ VE KADIN ISBN 978-605-9241-84-7, 2016
Nazi yönetimi ideolojik hedeflerini gerçekleştirme amacıyla kadınları çeşitli alanlarda farklı yöntemlerle kullanmıştır. Ülkede Nazi totaliter sistemlerini gerçekleştirme amacıyla Alman kadınlarına ‘nasıl ideal “Alman (ev) kadını” olunur’ ile başlayan yeni bir eğitim, anlayış ve hayat tarzı uygulamaları başlatılmıştır. Alman kadınlarına evlerde biçilen rollerine ilaveten, iş dünyasında ve askeriyede de çeşitli görevler verilmiştir. Bunlar; sıhhî hemşirelik, muharip askerlik, casusluk yanında ekonominin alt yapısında vasıfsız işçi ve askerî malzeme üretiminde destek eleman, asker ve yöneticilerin cinsel ihtiyaçlarını karşılamak amacıyla seks çalıştırılanları ve kölelik olmuştur. Alman erkek yöneticilerin hemen her türlü vasıfsız işlerinde çalıştırdıkları kadınlar, savaşın son aşamalarında ve hemen sonrasında Almanya’yı işgal eden müttefikler tarafından da, oldukça farklı, kötü ve acımasız muamelelere maruz kalmışlardır. Yüzbinlerce Alman kadınını son derece olumsuz etkileyen durum ise, Almanya’yı işgal eden Müttefik kuvvetlerince bir savaş aracı olarak tecavüze uğramalarıdır. Savaş sonrasında binlerce kadın maruz kaldıkları bu elim tecavüzler sebebiyle ya intihar etmiş ya da istemedikleri travmalı gebeliklerini doğumla sonuçlandırmak zorunda kalmışlardır. Bunun sosyo-psikolojik etkisi Alman ve Avrupa toplumlarını etkilemiştir. Bu çalışma, yukarıda bahsedilen Alman kadınlarının Nazi Yönetimi ve ideoloji altında nasıl bir hayat yaşadıkları/yaşatıldıkları, savaş sonunda ise, ne gibi muamelelere maruz kaldıkları hakkında yapılan siyaset ve cinsiyet çalışmalarına katkıda bulunmak amacındadır. Kadınların yaşadıkları tecrübelerin hangi ideolojik ve siyasî akım anlayışlarının neticeleri siyaset ve cinsiyet bağlamında örnekleriyle anlatılmaktadır. Anahtar Kelimeler: Nazi kadınları, kadınlık, kadın politikaları, siyasette kadın, cinsiyet.
Funes. Journal of Narratives and Social Sciences, 2022
https://nzgivenwords.blogspot.com/2024/09/given-poems-national-poetry-day-2024_11.html, 2024
Archives of Electrical Engineering, 2012
Buku Monograf, 2022
Frontiers in climate, 2024
Malaria Journal, 2021
Journal of Cancer Epidemiology, 2016
Contribuciones Desde Coatepec, 2001
Translational Psychiatry, 2019
Journal of Elasticity, 2014
Journal of Applied Aquaculture, 1996
International Journal of Process Management and Benchmarking, 2016
Journal of Materials Science, 1995
Journal of Bangladesh College of Physicians and Surgeons, 2012