dc.contributor.author |
Huey, Ming Lee |
|
dc.contributor.author |
Tsang, Yean Lee |
|
dc.contributor.author |
Lily, Lin |
|
dc.date.accessioned |
2011-04-18T01:34:59Z |
|
dc.date.available |
2011-04-18T01:34:59Z |
|
dc.date.issued |
2008 |
|
dc.identifier.citation |
VNU Journal of Science, Natural Sciences and Technology 24 (2008) 170-178 |
vi |
dc.identifier.issn |
0866-8612 |
|
dc.identifier.uri |
http://hdl.handle.net/123456789/299 |
|
dc.description.abstract |
Grid computing architecture was defined to be a complete physical layer. Based on the
grid computing architecture, we divided grid nodes into supervisor grid node and execute grid nod.
The data transfer in network must be in secure. In this study, we propose the encryption and
decryption algorithm in each grid node to keep information processing in security. We create user
information database both in supervisor and execute grid nodes. We use them to verify user
processing in system. When these algorithms install in all grid nodes, we can keep processing be
secure in all system. |
vi |
dc.language.iso |
en |
vi |
dc.publisher |
ĐHQGHN |
vi |
dc.subject |
Decryption algorithm |
vi |
dc.subject |
Encryption algorithm |
vi |
dc.subject |
Grid computing |
vi |
dc.subject |
Security |
vi |
dc.title |
Security of information processing based on grid environment |
vi |
dc.type |
Article |
vi |