{"created":"2021-01-14T07:54:15.730389+00:00","id":7462,"links":{},"metadata":{"_buckets":{"deposit":"57813030-da7e-4c69-9201-c029bfa87357"},"_deposit":{"created_by":92,"id":"7462","owner":"92","owners":[92],"owners_ext":{"displayname":"","email":"khin_sandar_chit@miit.edu.mm","username":""},"pid":{"revision_id":0,"type":"depid","value":"7462"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/00007462","sets":["1582963674932","1582963674932:1597397014014"]},"communities":["miit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Identity Based Secure and Confidential Mechanism In Cloud Computing Environment","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"This paper provide a secure and confidential mechanism by using identity based session key generation and a hybrid cryptographic technique in cloud computing environment. The nature of the system is well suited for distributed nature of cloud servers for an efficient processing with greatly enhanced user's confidence in cloud computing."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Data security"},{"interim":"Cloud computing"},{"interim":"Distributed computing"},{"interim":"Software as a service"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2021-01-14"}],"displaytype":"preview","filename":"AICT2013.pdf","filesize":[{"value":"753 KB"}],"format":"application/pdf","licensetype":"license_0","url":{"url":"https://meral.edu.mm/record/7462/files/AICT2013.pdf"},"version_id":"1c1a4e69-c560-4799-ae59-37c392ac823c"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"AICT","subitem_c_date":"2013-Feb-9","subitem_conference_title":"5th Conference on Applied Information and Communication Technology (AICT-2013)","subitem_place":"Mandalay","subitem_session":"Cryptography and Network security"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Khin Lay Mon"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2013-02-09"},"item_title":"Identity Based Secure and Confidential Mechanism In Cloud Computing Environment","item_type_id":"21","owner":"92","path":["1582963674932","1597397014014"],"publish_date":"2021-01-14","publish_status":"0","recid":"7462","relation_version_is_last":true,"title":["Identity Based Secure and Confidential Mechanism In Cloud Computing Environment"],"weko_creator_id":"92","weko_shared_id":-1},"updated":"2021-12-13T03:15:16.663228+00:00"}