skip to main content
article

Globus security model for grid environment

Published:01 November 2005Publication History
Skip Abstract Section

Abstract

Grid technology is increasingly being looked upon as a natural extension of the internet for engaging in complex data processing tasks over resources which are distributed across the world. Architects and developers employing grid systems must take into consideration security implications. Dynamic generation of virtual organizations leads to a synergistic picture which has to address security requirements never encountered before. Globus toolkit has devised a framework for making secure use of grid resource components which has been proved to be a feasible solution by a number of academic and scientific organizations. This paper is an attempt to identify and discern mechanisms proposed by Globus security model with certain test scenarios.

References

  1. Ian Foster, Carl Kesselman, Steven Tuecke, "The Anatomy of Grid Enabling Scalable Virtual Organizations", online at http://www.globus.org/alliance/publications/papers/anatomy.pdfGoogle ScholarGoogle Scholar
  2. Ian Foster, Carl Kesselman, Jeffrey M. Nick, Steven Tuecke, "The Physiology of the Grid, An Open Grid Services Architecture for Distributed Systems Integration", online at http://www.globus.org/alliance/publications/papers/ogsa.pdfGoogle ScholarGoogle Scholar
  3. Ian Foster, Carl Kesselman, Gene Tsudik, Steven Tsuecke, "A Security Architecture for Computational Grids," Proceedings of the 5th ACM Conference on Computer and Communications Security, 1998, pp 83--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Zsolt Nemeth, Vaidy Sunderam, "A comparison of Conventional Distributed Computing Environments and Computational Grids," online at http://www.mathcs.emory.edu/dcl/h2o/papers/grids_iccs02.pdfGoogle ScholarGoogle Scholar
  5. Nataraj Nagaratnam, Philippe Janson, John Dayka, Anthony Nadalin, Frank Siebenlist, Von Welch, Ian Foster, Steve Tuecke, "The Security Architecture for Open Grid Services", online at http://www.cs.virginia.edu/~humphrey/ogsa-sec-wg/OGSA-SecArch-v1-07192002.pdfGoogle ScholarGoogle Scholar
  6. Jim Basney, "Using the MyProxy Online Credential Repository", online at http://www.globusworld.org/2005Slides/Session%204b(2).pdfGoogle ScholarGoogle Scholar
  7. Olivier Chevassut, "Secure (one -time-)Password Authentication for the Globus Toolkit", online at http://www.globusworld.org/2005Slides/Session%207b(3).pdfGoogle ScholarGoogle Scholar
  8. http://www.globus.org/toolkit/docs/3.2/installation/index.htmlGoogle ScholarGoogle Scholar
  9. http://www.globus.org/toolkit/docs/3.2/installation/install_config.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. Globus security model for grid environment

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in

                  Full Access

                  • Published in

                    cover image ACM SIGSOFT Software Engineering Notes
                    ACM SIGSOFT Software Engineering Notes  Volume 30, Issue 6
                    November 2005
                    44 pages
                    ISSN:0163-5948
                    DOI:10.1145/1102107
                    Issue’s Table of Contents

                    Copyright © 2005 Authors

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 1 November 2005

                    Check for updates

                    Qualifiers

                    • article

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader