Index Link

  • RootNode

Item

{"_buckets": {"deposit": "57813030-da7e-4c69-9201-c029bfa87357"}, "_deposit": {"created_by": 92, "id": "7462", "owner": "92", "owners": [92], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "depid", "value": "7462"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/00007462", "sets": ["user-miit"]}, "communities": ["miit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Identity Based Secure and Confidential Mechanism In Cloud Computing Environment", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "This paper provide a secure and confidential mechanism by using identity based session key generation and a hybrid cryptographic technique in cloud computing environment. The nature of the system is well suited for distributed nature of cloud servers for an efficient processing with greatly enhanced user\u0027s confidence in cloud computing."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Data security"}, {"interim": "Cloud computing"}, {"interim": "Distributed computing"}, {"interim": "Software as a service"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2021-01-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "AICT2013.pdf", "filesize": [{"value": "753 KB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 753000.0, "url": {"url": "https://meral.edu.mm/record/7462/files/AICT2013.pdf"}, "version_id": "1c1a4e69-c560-4799-ae59-37c392ac823c"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "AICT", "subitem_c_date": "2013-Feb-9", "subitem_conference_title": "5th Conference on Applied Information and Communication Technology (AICT-2013)", "subitem_place": "Mandalay", "subitem_session": "Cryptography and Network security"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khin Lay Mon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-09"}, "item_title": "Identity Based Secure and Confidential Mechanism In Cloud Computing Environment", "item_type_id": "21", "owner": "92", "path": ["1582963674932", "1597397014014"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000007462", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2021-01-14"}, "publish_date": "2021-01-14", "publish_status": "0", "recid": "7462", "relation": {}, "relation_version_is_last": true, "title": ["Identity Based Secure and Confidential Mechanism In Cloud Computing Environment"], "weko_shared_id": -1}

Identity Based Secure and Confidential Mechanism In Cloud Computing Environment

http://hdl.handle.net/20.500.12678/0000007462
6b40abdb-8f96-4e7f-bda7-680a04b060ad
57813030-da7e-4c69-9201-c029bfa87357
None
Name / File License Actions
AICT2013.pdf AICT2013.pdf (753 KB)
Publication type
Conference paper
Upload type
Publication
Title
Title Identity Based Secure and Confidential Mechanism In Cloud Computing Environment
Language en
Publication date 2013-02-09
Authors
Khin Lay Mon
Description
This paper provide a secure and confidential mechanism by using identity based session key generation and a hybrid cryptographic technique in cloud computing environment. The nature of the system is well suited for distributed nature of cloud servers for an efficient processing with greatly enhanced user's confidence in cloud computing.
Keywords
Data security, Cloud computing, Distributed computing, Software as a service
Conference papers
AICT
2013-Feb-9
5th Conference on Applied Information and Communication Technology (AICT-2013)
Mandalay
Cryptography and Network security
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats