MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "57813030-da7e-4c69-9201-c029bfa87357"}, "_deposit": {"created_by": 92, "id": "7462", "owner": "92", "owners": [92], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "depid", "value": "7462"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/00007462", "sets": ["user-miit"]}, "communities": ["miit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Identity Based Secure and Confidential Mechanism In Cloud Computing Environment", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "This paper provide a secure and confidential mechanism by using identity based session key generation and a hybrid cryptographic technique in cloud computing environment. The nature of the system is well suited for distributed nature of cloud servers for an efficient processing with greatly enhanced user\u0027s confidence in cloud computing."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Data security"}, {"interim": "Cloud computing"}, {"interim": "Distributed computing"}, {"interim": "Software as a service"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2021-01-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "AICT2013.pdf", "filesize": [{"value": "753 KB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 753000.0, "url": {"url": "https://meral.edu.mm/record/7462/files/AICT2013.pdf"}, "version_id": "1c1a4e69-c560-4799-ae59-37c392ac823c"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "AICT", "subitem_c_date": "2013-Feb-9", "subitem_conference_title": "5th Conference on Applied Information and Communication Technology (AICT-2013)", "subitem_place": "Mandalay", "subitem_session": "Cryptography and Network security"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Khin Lay Mon"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-09"}, "item_title": "Identity Based Secure and Confidential Mechanism In Cloud Computing Environment", "item_type_id": "21", "owner": "92", "path": ["1582963674932", "1597397014014"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000007462", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2021-01-14"}, "publish_date": "2021-01-14", "publish_status": "0", "recid": "7462", "relation": {}, "relation_version_is_last": true, "title": ["Identity Based Secure and Confidential Mechanism In Cloud Computing Environment"], "weko_shared_id": -1}
Identity Based Secure and Confidential Mechanism In Cloud Computing Environment
http://hdl.handle.net/20.500.12678/0000007462
http://hdl.handle.net/20.500.12678/00000074626b40abdb-8f96-4e7f-bda7-680a04b060ad
57813030-da7e-4c69-9201-c029bfa87357
Name / File | License | Actions |
---|---|---|
AICT2013.pdf (753 KB)
|
Publication type | ||||||
---|---|---|---|---|---|---|
Conference paper | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Identity Based Secure and Confidential Mechanism In Cloud Computing Environment | |||||
Language | en | |||||
Publication date | 2013-02-09 | |||||
Authors | ||||||
Khin Lay Mon | ||||||
Description | ||||||
This paper provide a secure and confidential mechanism by using identity based session key generation and a hybrid cryptographic technique in cloud computing environment. The nature of the system is well suited for distributed nature of cloud servers for an efficient processing with greatly enhanced user's confidence in cloud computing. | ||||||
Keywords | ||||||
Data security, Cloud computing, Distributed computing, Software as a service | ||||||
Conference papers | ||||||
AICT | ||||||
2013-Feb-9 | ||||||
5th Conference on Applied Information and Communication Technology (AICT-2013) | ||||||
Mandalay | ||||||
Cryptography and Network security |