A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services

  • Namje Park
  • Kiyoung Moon
  • Kyoil Chung
  • Dongho Won
  • Yuliang Zheng
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3579)


Today’s grid architecture encompasses a far greater breadth of applications than the traditional grid, which focused on distributed applications processing large amounts of data. Newer grid applications are more data-centric and more focused on distributed services. As these trends, mobile internet and the grid, are likely to find each other the resource constraints that wireless devices pose today affect the level of interoperability between them. The goal of this paper is to investigate how well the most limited wireless devices can make the use of grid security services. This paper describes a novel security approach on fast mobile grid services based on current mobile web services platform environment using XML signcryption mechanism.


  1. 1.
    Tuisku, M.: Wireless Java-enabled MIDP Devices as peers in Grid Infrastructure. Helsinki Institute of Physics, CERNGoogle Scholar
  2. 2.
    Wen, Y.: Mobile Grid Major area examination. University of California, Berkeley (2002)Google Scholar
  3. 3.
    Faldella, E., Prandini, M.: A Novel Approach to On-Line Status Authentication of Public Key Certificates. In: Proc. the 16th Annual Computer Security Applications Conference (2000)Google Scholar
  4. 4.
    Nakamur, Y., et al.: Toward the Integration of web services security on enterprise environments. In: IEEE SAINT 2002 (2002)Google Scholar
  5. 5.
    Berbecaru, D., Lioy, A.: Towards Simplifying PKI Implementation, Client-Server based Validation of Public Key Certificates. In: IEEE ISSPIT, pp. 277–281 (2002)Google Scholar
  6. 6.
    Baek, J., et al.: Formal Proofs for the security of signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 80–98. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Zheng, Y.: Digital signcryption or How to Achieve Cost(Signature & Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)Google Scholar
  8. 8.
    Han, W., et al.: A Gateway and Framework for Telematics Systems Independent on Mobile Networks. ETRI Journal 27(1), 106–109 (2005)CrossRefGoogle Scholar
  9. 9.
    Baek, J.H., et al.: An Efficient Two-Step Paging Strategy Using Base Station Paging Agents in Mobile Communication Networks. ETRI Journal 26(5), 493–496 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Namje Park
    • 1
  • Kiyoung Moon
    • 1
  • Kyoil Chung
    • 1
  • Dongho Won
    • 2
  • Yuliang Zheng
    • 3
  1. 1.Information Security Research DivisionETRIDaejeonKorea
  2. 2.School of Information and Communication EngineeringSungkyunkwan UniversitySuwon-si, Gyeonggi-doKorea
  3. 3.The University of North Carolina at CharlotteCharlotteUSA

Personalised recommendations