Publication:
Recursive model and unique code (pattern) generation for authentication and authorization in grid computing

dc.contributor.affiliation#PLACEHOLDER_PARENT_METADATA_VALUE#en_US
dc.contributor.authorNajhan Muhamad Ibrahimen_US
dc.date.accessioned2024-10-08T07:41:24Z
dc.date.available2024-10-08T07:41:24Z
dc.date.issued2009
dc.description.abstractSecurity requirements are fundamental to the grid design and architecture. The basic security components within the Grid environment provide the mechanisms for authentication, authorization, and confidentiality of communication between grid computers. Some of the security models generate simple security codes where they would be easy to be cracked and some have applied bio-metric generations. Biometric model will lead to future privacy issue where most nations have approved to use data protection act, where some action or misuse of this Bio-metric data will be construed as conducting a crime with or without intention. This research explores biobased recursive programming theory to serve the best security mechanism for future Grid Computing where currently the security issues of Computer Grid environment are still at its infancy stage, an area with very high potential to conduct research. The main motivation for this project is to explore whether bio-based recursive programming model will be able to generate a promising Authentication and Authorization code patterns. The Tower of Hanoi is the meta-magical model where it is able to be modified to adapt to generate bio-like genetic codes and such few research study of similar nature has successfully been conducted. In this research study we generated and evaluated unique codes or patterns which would be with particles of large and randomized codes that are non-repetitive and non-predictive strings of genetic codes. In this modified model by using combinations of recursive models with step-wise randomization, each generated pattern will deliver different authentication or authorization certificates. We are also able to compare which other recursive models that would generate the most effective code or pattern to be used as authentication or authorization certificates. Programming recursive code generator using multiple Towers of Hanoi was implemented on the Grid computing environment that itself had generated the unique code or the unique pattern to obtain the required authentication and authorization certificates.en_US
dc.description.callnumbert QA 76.9 C58 N162R 2009en_US
dc.description.degreelevelMaster
dc.description.identifierThesis : Recursive model and unique code (pattern) generation for authentication and authorization in grid computing /by Najhan Muhammad Ibrahimen_US
dc.description.identityt00011149307NajhanMuhamadQA76.9C58N162R2009en_US
dc.description.kulliyahKulliyyah of Information and Communication Technologyen_US
dc.description.notesThesis (MIT) -- International Islamic University Malaysia, 2009en_US
dc.description.physicaldescriptionxi, 98 leaves : ill. ; 30 cmen_US
dc.description.programmeMaster of Information Technologyen_US
dc.identifier.urihttps://studentrepo.iium.edu.my/handle/123456789/9503
dc.identifier.urlhttps://lib.iium.edu.my/mom/services/mom/document/getFile/rnLI214tBwRh8NGi0DCutUA9NkmAywiy20111115103547812
dc.language.isoenen_US
dc.publisherGombak : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2009en_US
dc.rightsCopyright International Islamic University Malaysia
dc.subject.lcshComputational grids (Computer systems)en_US
dc.subject.lcshComputer securityen_US
dc.subject.lcshBiometric identificationen_US
dc.titleRecursive model and unique code (pattern) generation for authentication and authorization in grid computingen_US
dc.typeMaster Thesisen_US
dspace.entity.typePublication

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
t00011149307NajhanMuhamadQA76.9C58N162R2009_SEC_24.pdf
Size:
871.82 KB
Format:
Adobe Portable Document Format
Description:
24 pages file
Loading...
Thumbnail Image
Name:
t00011149307NajhanMuhamadQA76.9C58N162R2009_SEC.pdf
Size:
4.53 MB
Format:
Adobe Portable Document Format
Description:
Full text secured file

Collections