Key escrow is an inherent property in the current proposed IdentityBased Encryption (IBE) systems. However the key escrow is not always a good property for all applications. In this paper, we present a scheme which removes the key escrow from the IBE system proposed by Bonch and Franklin, while at the same time maintaining some important properties of the IBE. We also present some cryptosystems based on our variant including a signature scheme and an authenticated key agreement. We finally show how to integrate our scheme into a hierarchial identity based public key encryption system.
Lately, XML Web Services are emerging as a dominant platform in the computing world. At the moment, the web has evolved into an active medium for providers and consumers of services. One of the major problems for XML Web Services is the related with security. The paper describes a comprehensive XML Web Services Management Architecture that supports, integrates and unifies several security models, mechanisms and technologies in a way that enable a variety of systems to securely interoperate in a platform independent, comprehensive manner.
XML Web Services have the potential of becoming the underlying technology on which the future of the Internet is built. However, several hurdles stand in the way before that can happen. Security issues, for one, are slowing down the rate at which industry adopts the use of Web Services and in spite of the coordinated efforts made to correct those problems, the actual results can be years away. This paper is aimed at providing a more immediate solution for Web Services in the form of an architectural design, not only regarding security aspects, but rather enabling a wider range of e-commerce supporting features which are of utmost importance for a wide acceptance of this technology within the industry. 2 MAIN ISSUES WITH WEB SERVICES As discussed above, providing developers some straightforward way of securing services is the main concern at the moment. However, the technology 25
Jini networking technology represents an exciting paradigm in distributed systems. Its elegant approach in computer networking possesses immense advantages, but also generates security problems. Extensive research has been undertaken and existing security methodologies have been applied to provide a safe execution environment. However the unique nature of Jini has made it hard for traditional security mechanisms to be applied effectively. Part of the problem lies within the downloaded code and in the lack of centralised control. Current solutions are based on assumptions; therefore they are inadequate for enforcing the security requirements of the system. The goal of our research is to increase the security of the Jini model without altering its initial characteristics. We present our preliminary research efforts in providing an alternative, fault tolerant security architecture that uses a trusted local verifier in order to evaluate and certify the correctness of remote calls.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.