Recursive model and unique code (pattern) generation for authentication and authorization in grid computing /

Security requirements are fundamental to the grid design and architecture. The basic security components within the Grid environment provide the mechanisms for authentication, authorization, and confidentiality of communication between grid computers. Some of the security models generate simple secu...

Full description

Saved in:
Bibliographic Details
Main Author: Najhan Muhamad Ibrahim
Format: Thesis
Language:English
Published: Gombak, Selangor : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2009
Subjects:
Online Access:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 043270000a22004090004500
001 481022
005 20230420113406.0
008 100506t2009 my a 000 0 eng d
035 |a (Sirsi) 481022 
040 |a UIAM  |b eng 
043 |a a-my-- 
050 |a QA76.9.C58 
100 1 |a Najhan Muhamad Ibrahim  |9 68902 
245 1 0 |a Recursive model and unique code (pattern) generation for authentication and authorization in grid computing /  |c by Najhan Muhammad Ibrahim 
260 |a Gombak, Selangor :  |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,  |c 2009 
300 |a xi, 98 leaves :  |b ill. ;  |c 30 cm. 
336 |2 rdacontent 
337 |2 rdamedia 
338 |2 rdacarrier 
500 |a "A dissertation submitted on partial fulfilment of the requirements for the degree of Master of Information Technology" --On t.p. 
502 |a Thesis (MIT) -- International Islamic University Malaysia, 2009. 
504 |a Includes bibliographical references and index (leaves 95-97) and index. 
520 |a Security requirements are fundamental to the grid design and architecture. The basic security components within the Grid environment provide the mechanisms for authentication, authorization, and confidentiality of communication between grid computers. Some of the security models generate simple security codes where they would be easy to be cracked and some have applied bio-metric generations. Biometric model will lead to future privacy issue where most nations have approved to use data protection act, where some action or misuse of this Bio-metric data will be construed as conducting a crime with or without intention. This research explores biobased recursive programming theory to serve the best security mechanism for future Grid Computing where currently the security issues of Computer Grid environment are still at its infancy stage, an area with very high potential to conduct research. The main motivation for this project is to explore whether bio-based recursive programming model will be able to generate a promising Authentication and Authorization code patterns. The Tower of Hanoi is the meta-magical model where it is able to be modified to adapt to generate bio-like genetic codes and such few research study of similar nature has successfully been conducted. In this research study we generated and evaluated unique codes or patterns which would be with particles of large and randomized codes that are non-repetitive and non-predictive strings of genetic codes. In this modified model by using combinations of recursive models with step-wise randomization, each generated pattern will deliver different authentication or authorization certificates. We are also able to compare which other recursive models that would generate the most effective code or pattern to be used as authentication or authorization certificates. Programming recursive code generator using multiple Towers of Hanoi was implemented on the Grid computing environment that itself had generated the unique code or the unique pattern to obtain the required authentication and authorization certificates. 
546 |a Abstracts in English and Arabic. 
650 |a Computational grids (Computer systems)   |9 68903 
650 |a Computer security  |9 39002 
650 |a Biometric identification  |9 39002 
655 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Department of Information Systems  |z IIUM  |9 8472 
710 2 |a International Islamic University Malaysia.  |b Department of Information System  |9 60331 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/5522  |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. 
900 |a hj-fs-hm 
942 |2 lcc  |n 0 
999 |c 434416  |d 464652 
952 |0 0  |6 T QA 000076.9 C58 N162R 2009  |7 0  |8 THESES  |9 752032  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t QA 76.9 C58 N162R 2009  |p 00011149307  |r 2017-10-20  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 LU T QA 76.9 C58 N162R 2009  |7 0  |8 THESES  |9 754124  |a IIUM  |b IIUM  |c CLOSEACCES  |g 0.00  |o lu t QA 76.9 C58 N162R 2009  |p 00011274594  |r 2017-10-25  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF QA 76.9 C58 N162R 2009  |7 0  |8 THESES  |9 837855  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf QA 76.9 C58 N162R 2009  |p 11100326603  |r 2017-10-26  |t 1  |v 0.00  |y THESISDIG