Abstract
Collaborative computing environments which allow remote execution of applications, need a remote storage facility that supports shared access to the software resources required for computation. In this context, there is also a need to guarantee authorized and secure access to the shared resources. This paper investigates the use of a repository system in collaborative computing environments and discusses techniques to provide privacy, user authentication and access control to the repository using certificates. A protocol based on SSL is developed for query processing. The IceT environment is used as an exemplar for the application of the secure repository system.
Research supported by NSF grant ACI-9872167 and the University of Northern Iowa’s Graduate College.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
PostgreSQL user’s guide. URL: http://www.postgresql.org/docs/user/user.html.
A. O. Freier, P. Karlton and P. C. Kosher. The SSL Protocol, version 3.0. Netscape Communications, Internet Draft, Nov 1996. URL: http://www.netscape.com/eng/ssl3/.
C. Catlett and L. Smarr. Metacomputing. Communications of The ACM, 35(6):44–52, 1992.
S. Chodrow, S. Cheung, P. Hutto, A. Krantz, P. Gray, T. Goddard, I. Rhee, and V. Sunderam. CCF: A Collaborative Computing Frameworks. In IEEE Internet Computing, Jan/Feb 2000.
Computer Emergency Response Team. Ongoing Network Monitoring Attacks. CERT Advisory: CA-94:01, Feb 1994.
I. Foster and C. Kesselman. Globus: A Metacomputing Infrastructure Toolkit. International Journal of Supercomputing Applications, May 1997.
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke. A security architecture for computational grids. In ACM Conference on Computers and Security, pages 83–91. ACM Press, 1998.
Internation Telecommunication Union. X.509: Information Technology-open systems interconnection-the directory: Public-key and attribute certificate frameworks. ITU-T Recommendation, Mar 2000. To be published.
J. Barrett and R. Silverman. SSH, The Secure Shell: The Definitive Guide. O’Reilly, 1st edition, 2001.
J. Martin and J. Leben. Client/Server Databases-Enterprise Computing. Prentice Hall P T R, 1995.
J. Steiner and C. Neuman and J. Schiller. Kerberos: An Authentication Service for Open Network Systems. In Usenix Conference Proceedings, 1988.
M. Dekker. Security of the Internet. The Froehlich/Kent Encyclopedia of Telecommunications, 15:231–255, 1997. URL: http://www.cert.org/encyc article/tocencyc.html.
M. Migliardi and V. Sunderam. Heterogeneous Distributed Virtual Machines in the Harness Metacomputing Framework.
M. Thomson, W. Johnston, S. Mudumbai, G. Hoo, K. Jackson, and A. Essari. Certificatebased access control for widely distributed resources. In Proceedings of the Eighth Usenix Security Symposium, Aug 99.
P. Gray and V. Sunderam. IceT: Distributed Computing and Java. Concurrency: Practice and Experience, 11(9):1161–1167, Nov 1997.
T. H. Dunigan and N. Venugopal. Secure PVM. Technical Report TM-13203, Oak Ridge National Laboratories, Aug 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gray, P.A., Chandramohan, S., Sunderam, V.S. (2001). A Repository System with Secure File Access for Collaborative Environments. In: Alexandrov, V.N., Dongarra, J.J., Juliano, B.A., Renner, R.S., Tan, C.J.K. (eds) Computational Science — ICCS 2001. ICCS 2001. Lecture Notes in Computer Science, vol 2073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45545-0_49
Download citation
DOI: https://doi.org/10.1007/3-540-45545-0_49
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42232-7
Online ISBN: 978-3-540-45545-5
eBook Packages: Springer Book Archive