Recursive model and unique code (pattern) generation for authentication and authorization in grid computing /
Security requirements are fundamental to the grid design and architecture. The basic security components within the Grid environment provide the mechanisms for authentication, authorization, and confidentiality of communication between grid computers. Some of the security models generate simple secu...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Gombak, Selangor :
Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,
2009
|
Subjects: | |
Online Access: | Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 043270000a22004090004500 | ||
---|---|---|---|
001 | 481022 | ||
005 | 20230420113406.0 | ||
008 | 100506t2009 my a 000 0 eng d | ||
035 | |a (Sirsi) 481022 | ||
040 | |a UIAM |b eng | ||
043 | |a a-my-- | ||
050 | |a QA76.9.C58 | ||
100 | 1 | |a Najhan Muhamad Ibrahim |9 68902 | |
245 | 1 | 0 | |a Recursive model and unique code (pattern) generation for authentication and authorization in grid computing / |c by Najhan Muhammad Ibrahim |
260 | |a Gombak, Selangor : |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, |c 2009 | ||
300 | |a xi, 98 leaves : |b ill. ; |c 30 cm. | ||
336 | |2 rdacontent | ||
337 | |2 rdamedia | ||
338 | |2 rdacarrier | ||
500 | |a "A dissertation submitted on partial fulfilment of the requirements for the degree of Master of Information Technology" --On t.p. | ||
502 | |a Thesis (MIT) -- International Islamic University Malaysia, 2009. | ||
504 | |a Includes bibliographical references and index (leaves 95-97) and index. | ||
520 | |a Security requirements are fundamental to the grid design and architecture. The basic security components within the Grid environment provide the mechanisms for authentication, authorization, and confidentiality of communication between grid computers. Some of the security models generate simple security codes where they would be easy to be cracked and some have applied bio-metric generations. Biometric model will lead to future privacy issue where most nations have approved to use data protection act, where some action or misuse of this Bio-metric data will be construed as conducting a crime with or without intention. This research explores biobased recursive programming theory to serve the best security mechanism for future Grid Computing where currently the security issues of Computer Grid environment are still at its infancy stage, an area with very high potential to conduct research. The main motivation for this project is to explore whether bio-based recursive programming model will be able to generate a promising Authentication and Authorization code patterns. The Tower of Hanoi is the meta-magical model where it is able to be modified to adapt to generate bio-like genetic codes and such few research study of similar nature has successfully been conducted. In this research study we generated and evaluated unique codes or patterns which would be with particles of large and randomized codes that are non-repetitive and non-predictive strings of genetic codes. In this modified model by using combinations of recursive models with step-wise randomization, each generated pattern will deliver different authentication or authorization certificates. We are also able to compare which other recursive models that would generate the most effective code or pattern to be used as authentication or authorization certificates. Programming recursive code generator using multiple Towers of Hanoi was implemented on the Grid computing environment that itself had generated the unique code or the unique pattern to obtain the required authentication and authorization certificates. | ||
546 | |a Abstracts in English and Arabic. | ||
650 | |a Computational grids (Computer systems) |9 68903 | ||
650 | |a Computer security |9 39002 | ||
650 | |a Biometric identification |9 39002 | ||
655 | |a Theses, IIUM local | ||
690 | |a Dissertations, Academic |x Department of Information Systems |z IIUM |9 8472 | ||
710 | 2 | |a International Islamic University Malaysia. |b Department of Information System |9 60331 | |
856 | 4 | |u http://studentrepo.iium.edu.my/handle/123456789/5522 |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. | |
900 | |a hj-fs-hm | ||
942 | |2 lcc |n 0 | ||
999 | |c 434416 |d 464652 | ||
952 | |0 0 |6 T QA 000076.9 C58 N162R 2009 |7 0 |8 THESES |9 752032 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o t QA 76.9 C58 N162R 2009 |p 00011149307 |r 2017-10-20 |t 1 |v 0.00 |y THESIS | ||
952 | |0 0 |6 LU T QA 76.9 C58 N162R 2009 |7 0 |8 THESES |9 754124 |a IIUM |b IIUM |c CLOSEACCES |g 0.00 |o lu t QA 76.9 C58 N162R 2009 |p 00011274594 |r 2017-10-25 |t 1 |v 0.00 |y THESIS | ||
952 | |0 0 |6 TS CDF QA 76.9 C58 N162R 2009 |7 0 |8 THESES |9 837855 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o ts cdf QA 76.9 C58 N162R 2009 |p 11100326603 |r 2017-10-26 |t 1 |v 0.00 |y THESISDIG |