Abstract
We propose the safe treatment of the certificate of authorization in this article. We insert the watermark in the certificate of authorization. Both of the owner and grantee keep the certificate of authorization. We encrypt the file of the certificate of authorization and watermark with different key to produce the file of cipher text. Both of the owner and grantee keep their files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The step that the certificate of authorization is encrypted and decrypted will be safer.
Original language | English |
---|---|
Title of host publication | Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 |
Pages | 460-465 |
Number of pages | 6 |
Volume | 2 |
DOIs | |
Publication status | Published - Dec 29 2008 |
Externally published | Yes |
Event | 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 - Busan, Korea, Republic of Duration: Nov 11 2008 → Nov 13 2008 |
Conference
Conference | 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 |
---|---|
Country/Territory | Korea, Republic of |
City | Busan |
Period | 11/11/08 → 11/13/08 |
ASJC Scopus subject areas
- Information Systems
- Software