A Flexible Method Using Identity Based Message Key Distribution for Securing Workflow Signatures
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: The increase in advancement of information technology led the migration of workflows from paper based to electronic workflow systems. Basically a workflow consists of a number of tasks and each of these tasks should be authenticated by using any of the cryptographic techniques. To provide more security within workflow systems, signing keys are used. In addition to data authenticity and integrity, logical relationships such as AND-join and AND-split are to be provided in a workflow signature scheme. Such a scheme was experimentally proven which is based on hierarchical identity-based cryptography to meet security properties required by inter-organizational workflows. Due its high complexity, a new mechanism, IB-MKD (Identity Based Message Key Distribution) is proposed as an alternative to HIBS, which is achieved with conventional RSA without any additional assumptions and limitations and it is believed to have less overhead.
Authors and Affiliations
Roshin Sharo Eapen
Implementation of AES Algorithm in MicroController Using PIC18F452
Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the encr...
An EfficientHybrid Push-Pull Based Protocol for VOD In Peer-to-Peer network
Abstract : Video-on-Demand is a service where movies are delivered to distributed users with low delay and free interactivity. The traditional client-server architecture experiences scalability issues to provide vi...
Efficient Disease Classifier Using Data Mining Techniques: Refinement of Random Forest Termination Criteria
In biomedical field, the classification of disease using data mining is the critical task. The prediction accuracy plays a vital role in disease data set. More data mining classification algorithms like decision...
Implementation of Network Security in Mobile AD-HOC Networks using Multilevel Encryption Techniques
When we are sending a secret information fromsource to destination over a wireless network, safe and secure transmission is a critical issue. An ad-hoc network is a set of wireless nodes and any type of central control o...
A Novel Approach for Semi Supervised Document Clustering with Constraint Score based Feature Supervision
Abstract: Text document clustering provides an effective technique to manage a huge amount of retrieval outcome by grouping documents in a small number of meaningful classes. In unsupervised clustering method the unlabel...