Building Trust In Cloud Using Public Key Infrastructure - A step towards cloud trust
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 3
Abstract
Cloud services have grown very quickly over the past couple of years, giving consumers and companies the chance to put services, resources and infrastructures in the hands of a provider. There are big security concerns when using cloud services. With the emergence of cloud computing, Public Key Infrastructure (PKI) technology has undergone a renaissance, enabling computer to computer communications. This study describes use of PKI in cloud computing and provides insights into some of the challenges which cloud-based PKI systems face
Authors and Affiliations
Ms. Heena Kharche , Mr. Deepak Singh Chouhan
Teaching Software Testing using Data Structures
Software testing is typically a rushed and neglected activity that is done at the final stages of software development. In particular, most students tend to test their programs manually and very seldom perform adequate t...
Design of Miniaturized Multiband Microstrip Patch Antenna using Defected Ground Structure
The recent developments in communication and antenna engineering demands compact and multiband antennas. Microstrip antenna is one of the most useful antennas for wireless communication because of its inherent features l...
Text Separation from Graphics by Analyzing Stroke Width Variety in Persian City Maps
Text segmentation is a live research field with vast new areas to be explored. Separating text layer from graphics is a fundamental step to exploit text and graphics information. The language used in the map is a challen...
A Novel Energy Efficient Mobility Aware MAC Protocol for Wireless Sensor Networks
Dealing with mobility at the link layer in an efficient and effective way is a formidable challenge in Wireless Sensor Networks due to recent boom in mobile applications and complex network scenarios. Most of the current...
Efficient Model for Distributed Computing based on Smart Embedded Agent
Technological advances of embedded computing exposed humans to an increasing intrusion of computing in their day-to-day life (e.g. smart devices). Cooperation, autonomy, and mobility made the agent a promising mechanism...