Abstract
A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented; the trusted root is made as an image data. The grid entity is trusted in the soft platform when its feature of image root is entirely matched with that from the other entities’ feature database in a scale space process. To recognize and detect the stable image root feature, the non-homogeneous linear expandable scale space is proposed. Focusing on relations between the scale parameter of the inhomogeneous Gaussian function terms and the space evolution of thermal diffusion homogeneous equations, three space evolution operators are constructed to exact and mark the feature from image root. Analysis and verification are carried on the new scale space, operators and the core of making decisions for grid entities certifications.
Similar content being viewed by others
References
Microsoft company network working group. Extensible Authentication Protocol (EAP) Key Management Framework [EB/OL]. [2012-04-01]. http://technet.microsoft.com/zh-cn/library/cc268397 .
Rand M, Kenton G, Michael N, et al. Microsoft Exchange Server 2003 Unleashed [M]. Chittagong: SAMS Press, 2003: 7–13.
Federal Financial Institutions Examination Council. Authentication in an internet banking environment, information technology examination handbook [EB/OL]. [2012-04-01]. http://www.ffiec.govAuthentication/ .
Azzedin F, Maheswaran M. Evolving and managing trust in grid computing systems [C]//Proceedings of the IEEE Canadian Conference on Electrical Computer Engineering, Vancouver: IEEE Press, 2002: 171–178.
The Globus Security Team. Globus toolkit version 4 grid security infrastructure: A standards perspective [EB/OL]. [2012-04-01]. http://globus.org/toolkit/docs/4.0/security/GT4-GSI-Overview.pdf .
Novotny J, Tuecke S, Welch V. An online credential repository for the grid: MyProxy [EB/OL]. [2012-04-01]. http://www.globus.org/alliance/publications/myproxy.pdf .
Trust Computing Group. TCG main specification Version 1.1b [EB/OL]. [2012-04-02]. http://wwww.trustedcomputinggr-oup.org/home .
Abwajyj H. Fault tolerant scheduling policy for grid computing systems [C]//Proceedings of the 18th IEEE International Parallel and Dist Ributed Processing Symposium. Los Alamitos: IEEE Computer Society Press, 2004: 238–244.
Abdul A, Hailes S. Supporting trust in virtual communities [C] //Proceedings of the Hawaii International Conference on System Sciences, Maui IEEE Computer Society Press, 2000: 239–248.
Liu Lizhao, Zhang Tianhua, Wang Ying, et al. The quantitative assignment of the grid behavior trust model based on trusted computing [J]. Geomatics and Information Science of Wuhan University, 2010, 53(5): 587–590 (Ch).
Liu Lizhao, Hu Xiaojing, Zhang Tianhua, et al. A real-time 3D collision detection encryption algorithm based on improved RC5 [J]. Advanced Science Letters, 2011, 4(4): 2708–2712.
Cyganek B, Malisz P. Dental implant examination based on the log-polar matching of the maxillary radiograph images in the anisotropic scale space [C] //2010 Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Amsterdam: IEEE Press, 2010: 3093–3096.
Atesal Y A. Millimeter-wave wafer-scale silicon bicmos power amplifiers using free-space power combining [J]. IEEE Transactions on Microwave Theory and Techniques, 2011, 59(4): 954–965.
Passieux J C, Ladevèze P, Néron D. A scalable time-space multiscale domain decomposition method: Adaptive time scale separation [J]. Computational Mechanics, 2010, 46(4): 621–633.
Dunlop M W. Use of multi-point analysis and modeling to address cross-scale coupling in space plasmas: Lessons from cluster [J]. Planetary and Space Science, 2011, 59(7): 630–638.
Haltas I, Kavvas M L. Scale invariance and self-similarity in hydrologic processes in space and time [J]. Journal of Hydrologic Engineering, 2010, 16(1): 51–63.
Pinheiro, Antnió M G. Piecewise approximation of contours through scale-space selection of dominant points [J]. IEEE Transactions on Image Processing, 2010, 19(6): 1442–1450.
Wong A, Mishra A K. Generalized probabilistic scale space for image restoration [J]. IEEE Transactions on Image Processing, 2010, 19(10): 2774–2780
Lei Z. Face recognition by exploring information jointly in space, scale and orientation [J]. IEEE Transactions on Image Processing, 2011, 20(1): 247–256.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation (61070151, 60903203, 61103246), the Natural Science Foundation of Fujian Province (2010J01353), the Xiamen University of Technology Scientific Research Foundation (YKJ11024R), Xiamen Scientific Research Foundation (3502Z20123037)
Biography: LIU Lizhao, male, Lecturer, Ph.D., research direction: cloud computing, data mining.
Rights and permissions
About this article
Cite this article
Liu, L., Liu, J., Zhu, S. et al. Grid services trusted authentication algorithm based on image trusted root in scale space. Wuhan Univ. J. Nat. Sci. 17, 521–530 (2012). https://doi.org/10.1007/s11859-012-0881-9
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-012-0881-9
Key words
- grid computing
- trusted computing
- services trust
- authentication
- scale space
- diffusion equation
- evolution operator
- feature detection