An Identity-Based Model for Grid Security Infrastructure

Author(s):  
Xiaoqin Huang ◽  
Lin Chen ◽  
Linpeng Huang ◽  
Minglu Li
2014 ◽  
pp. 308-315
Author(s):  
Oleksandr Sudakov ◽  
Andrii Salnikov ◽  
Ievgen Sliusar ◽  
Oleksandr Boretskyi

Tools for archiving and extraction of data in Ukrainian National Grid for end-users’ applications are proposed, implemented and deployed for practical applications in medical imaging, non-linear dynamics, and molecular biology. Proposed tools provide the facilities to utilize large distributed storage space in grid infrastructures for different practical tasks including desktop applications. Tools may be successfully used even when on client platforms it is impossible to setup grid middleware, use web browser interfaces or grid security infrastructure authentication. Tools consist of extensible client compatible with different software and hardware platforms; web service for data transfer; web service for transparent data replication on grid storage elements.


Author(s):  
Kwok-Yan Lam ◽  
Xi-Bin Zhao ◽  
Siu-Leung Chung ◽  
Ming Gu ◽  
Jia-Guang Sun

2010 ◽  
Vol 1 (1) ◽  
pp. 76-97
Author(s):  
Francesco Tusa ◽  
Massimo Villari ◽  
Antonio Puliafito

This article describes new security solutions for Grid middleware, and specifically faces the issues related to the management of users’ and servers’ credentials, together with storing and secure data transmission in the Grid. Our work, built on Grid Security Infrastructure (GSI), provides new capabilities (i.e. smart card Grid access, and strong security file storage XML-based) to be used on top of different Grid middlewares, with a low level of changes. This work is currently implemented on gLite and accomplishes the access to Grid resources in a uniform and transparent way. These improvements enable the Grid computing toward the new processing model known as business services.


Author(s):  
Baiyan Li ◽  
Ruonan Rao ◽  
Minglu Li ◽  
Jinyuan You

2006 ◽  
Vol 11 (6) ◽  
pp. 1805-1808 ◽  
Author(s):  
Yan Fei ◽  
Zhang Huanguo ◽  
Sun Qi ◽  
Shen Zhidong ◽  
Zhang Liqiang ◽  
...  

Author(s):  
Hoon Wei Lim

Public key infrastructure (PKI) is presently deployed in most grid implementations. Existing PKI-based grid systems make extensive use of public key certificates, both long-term and short-term, in order to support various grid security services, such as single sign-on, mutual authentication and delegation. Orthogonally, the emergence of identity-based cryptography (IBC), which is certificate-free, makes possible more lightweight, simpler public key management techniques than that of conventional certificate-based PKI. In this chapter, the authors study how properties of IBC can be used to design alternative grid security infrastructures which support grid security services in a more clean and natural way.


Sign in / Sign up

Export Citation Format

Share Document