Skip to main content

Certificate Use for Supporting Merging and Splitting of Computational Environments⋆

  • Conference paper
  • First Online:
  • 545 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2110))

Abstract

In recent years, numerous projects focusing on utilization of geographically-distributed environments have called upon certificates and certificate authorities for authentication, for validation, and for assigning access privileges to groups. This paper describes a prototype established for utilizing certificates in the IceT environment for facilitating merging of resource groups. This prototype extends this paradigm to leverage significantly upon certificate revocation lists to permit predictable, dynamic splittings of groups.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Butler, R., Engert, D., Foster, I., Kesselman, C., Tuecke, S., Volmer, J., and Welch, V. Design and deployment of a national-scale authentication infrastructure. IEEE Computer, 12 (2000), 60–66.

    Google Scholar 

  2. Diffie, W., and Hellman, M. New directions in cryptography. IEEE Transactions on Information Theory IT, 22 (Nov. 1976), 644–654.

    Article  MATH  MathSciNet  Google Scholar 

  3. Dunigan, T.H., and Venugopal, N. Secure PVM. Tech. Rep. TM-13203, Oak Ridge National Laboratories, Aug. 1996.

    Google Scholar 

  4. Foster, I., and Kesselman, C. Globus: A Metacomputing Infrastructure Toolkit. International Journal of Supercomputing Applications (May 1997).

    Google Scholar 

  5. Foster, I., and Kesselman, C. The Grid, Blueprint for a new computing infrastructure. Morgan Kaufmann Publishers, Inc., 1998.

    Google Scholar 

  6. Freier, A.O., Karlton, P., and Kocher, P.C. The SSL Protocol, version 3.0. Netscape Communications, Internet Draft. Available on-line at http://www.netscape.com/eng/ssl3/, Nov. 1996.

  7. Getov, V., Gray, P., and Sunderam, V. MPI and Java-MPI: Contrasts and comparisons of low-level commnication performance. In Proceedings of Supercomputing 99 (Nov. 1999).

    Google Scholar 

  8. Getov, V., Gray, P., and Sunderam, V. Aspects of portability and distributed execution for JNI-wrapped code. Concurrency: Practice and Experience 20, 11(200), 1039–1050. ISSN 1040-3108.

    Google Scholar 

  9. Gray, P., Sunderam, V., Geist, A., and Scott, S. Bringing cross-cluster functionality to processes through the merging and splitting of virtual environments. Submitted to JavaGrande/ISCOPE-2001 conference, Jan. 2001.

    Google Scholar 

  10. Grimshaw, A., Wulf, W., and French, J. Legion: The Next Logical Step Toward a Nationwide Virtual Computer. Tech. rep., University of Virginia, 1994. T-R Number CS-94-21.

    Google Scholar 

  11. Ingemarsson, I., Tang, D., and Wong, C. A Conference Key Distribution System. IEEE Transactions on Information Theory 28, 5 (Sept. 1982), 714–720.

    Article  MathSciNet  Google Scholar 

  12. International Telecommunication Union. X.509: Information technology-open systems interconnection-the directory: Public-key and attribute certificate frameworks, Mar. 2000. ITU-T Recommendation. To be published.

    Google Scholar 

  13. Kaufman, C., Perlman, R., and Speciner, M. Network Security: Private communication in a public world. Prentice Hall, Upper Saddle River, New Jersey 07458, 1995.

    Google Scholar 

  14. Sheng Liang. The Java Native Method Interface: Programming Guide and Reference. Addison-Wesley, 1998.

    Google Scholar 

  15. Thompson, M., Johnston, W., Mudambai, S., Hoo, G., Jackson, K., and Essiari, A. Certificate-based access control for widely distributed resources. In Proceedings of the Eighth Usenix Security Symposium (Aug. 1999).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gray, P.A., Sunderam, V.S. (2001). Certificate Use for Supporting Merging and Splitting of Computational Environments⋆. In: Hertzberger, B., Hoekstra, A., Williams, R. (eds) High-Performance Computing and Networking. HPCN-Europe 2001. Lecture Notes in Computer Science, vol 2110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48228-8_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-48228-8_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42293-8

  • Online ISBN: 978-3-540-48228-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics