Abstract
The problem of data unauthorized access in distributed computing networks is considered. Existing implementations of access control mechanisms used in grid systems are analyzed and their disadvantages are listed. The access control method that makes it possible to verify the status of distributed computing networks is proposed. Security parameters that form the initial state of the system are determined.
Similar content being viewed by others
References
Chakrabarti, A., Grid Computing Security, Berlin: Springer, 2007.
Chivers, H., Grid Security: Problems and Potential Solutions, University of York, 2003.
Zegzhda, P.D., Zegzhda, D.P., Kalinin, M.O., and Konoplev, A.S., Security modeling of grid systems using Petri nets, Computer Network Security: International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS-2012), Berlin: Springer-Verlag, 2012, pp. 299–308.
Konoplev, A.S. and Kalinin, M.O., Formalization of the objectives of grid systems resources protection from unauthorized access, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 272–277.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © A.S. Konoplev, M.O. Kalinin, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Konoplev, A.S., Kalinin, M.O. Access control method in distributed grid computing networks. Aut. Control Comp. Sci. 49, 679–683 (2015). https://doi.org/10.3103/S0146411615080088
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080088