XML-Based Security Acceleration Methods Supporting Fast Mobile Grid

  • Namje Park
  • Kiyoung Moon
  • Howon Kim
  • Seungjoo Kim
  • Dongho Won
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3590)

Abstract

Mobile grid, or wireless grid services refers to value-added grid service by processing in mobile environment. Besides mobile internet the traditional Internet computing is experiencing a conceptual shift from client-server model to grid and peer-to-peer computing models. As these trends, mobile internet and the grid, are likely to find each other the resource constraints that wireless devices pose today affect the level of interoperability between them. The goal of this paper is to investigate how well the most limited wireless devices can make use of grid security services. This paper describes a novel security approach on fast mobile grid services based on current mobile web services platform environment using XML signcryption mechanism.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Tuisku, M.: Wireless Java-enabled MIDP Devices as peers in Grid Infrastructure. Helsinki Institute of Physics. CERNGoogle Scholar
  2. 2.
    Wen, Y.: Mobile Grid Major Area Examination. University of California (2002)Google Scholar
  3. 3.
    Faldella, E., Prandini, M.: A Novel Approach to On-Line Status Authentication of Public Key Certificates. In: Proc. the 16th Annual Computer Security Applications Conference (2000)Google Scholar
  4. 4.
    Nakamur, Y., et al.: Toward the Integration of web services security on enterprise environments. In: IEEE SAINT 2002 (2002)Google Scholar
  5. 5.
    Berbecaru, D., Lioy, A.: Towards Simplifying PKI Implementation, Client-Server based Validation of Public Key Certificates. In: IEEE ISSPIT, pp. 277–281 (2002)Google Scholar
  6. 6.
    Baek, J., et al.: Formal Proofs for the security of signcryption. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 80–98. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Zheng, Y.: Digital signcryption or How to Achieve Cost(Signature & Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)Google Scholar
  8. 8.
    Baek, J.H., et al.: An Efficient Two-Step Paging Strategy Using Base Station Paging Agents in Mobile Communication Networks. ETRI Journal 26(5), 493–496 (2004)CrossRefGoogle Scholar
  9. 9.
    Proposed Fedral Information Proceeding standard for Digital Signature Standard(DSS), Fedral Register. vol. 56 (1991)Google Scholar
  10. 10.
    Bao, F., Deng, H.: A Signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 55–59. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  11. 11.
    Shin, E.S., et al.: Determination of the Optimal Access Charge for the Mobile Virtual Network Operator System. ETRI Journal 26(6), 665–668 (2004)CrossRefGoogle Scholar
  12. 12.
    Zheng, Y., et al.: Research on Software-based XML Signature Acceleration. Project of ETRI 1, 22–35 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Namje Park
    • 1
  • Kiyoung Moon
    • 1
  • Howon Kim
    • 1
  • Seungjoo Kim
    • 2
  • Dongho Won
    • 2
  1. 1.Information Security Research DivisionETRIDaejeonKorea
  2. 2.School of Information and Communication EngineeringSungkyunkwan UniversitySuwon-si, Gyeonggi-doKorea

Personalised recommendations