The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Grid Information Service (GIS) is an entity that gathers the latest information about the grid resources. These resources information are then retrieved by the grid users or brokers prior to planning task deployment in a grid environment. Hence, the GIS frequently communicate with the resources for their latest status, and hardware and software specifications. This creates the need for timely and...
As new concepts for eSciene like grid computing and cloud computing tend to leave the research phase and develop towards production quality, the security eventually moves into focus. Up to now research in the security area concentrates on authentication and authorization on the resources themselves, but to enhance network security more generally, access control must be pushed back to the entry point...
Combined with the grid development, this article analyzed the current widespread adoption of authentication mechanisms and researched GSI program and KX.509 program in different grid environment. With the proxy idea of KX.509, using and implementing a Web-login module to build the grid authentication model in the Globus environment. The module provides the transparent user certificate generation,...
Grid computing provides users with transparent access to substantial compute and storage resources. Up to now the main focus lay in the development of Grid infrastructures and the development of services providing access to grid resources. This leads to a negligence of security aspects, which, for example, leads to the recommendation of open wide port ranges on firewalls protecting the Grid resources...
The distributed computing system researches are active in various areas. It is the system to perform the operation in the various areas, for example, science and art and cryptography. We present security mechanism consisted of three phases: the simple authentication, the strong authentication and the rapid authentication. Additionally we designed the mechanism of scheduling for multi-job operation...
Grid users and their jobs need credentials to access grid resources and services. It is important to minimize the exposure of credentials to adversaries. A practical solution is needed that works with existing software and is easy to deploy, administer, and maintain. Thus, credential management services are the wave of the future for virtual organizations such as Grid computing. This paper describes...
In modern Collaborative Manufacturing, different security mechanisms of systems bring usage complexities and security risks. Grid Security Infrastructure (GSI) enables secure authentication and communication over computer networks. It is designed and developed on the technology of Java GSS-API, JAAS, Kerberos. The key technologies such as integrating with application server are specially discussed...
Key management is a decisive part for security in wireless sensor networks. Pre-distribution of secret keys for all pairs of nodes is not viable due to the large amount of memory used when the number of sensor node is huge. Recently, a random key pre-distribution scheme is proposed as an efficient solution for sharing keys among sensor nodes to reduce the length of shared key and avoid unnecessary...
To realize the real-time exchange of grid network data information, ensure the security in the process of information transmission, ensure that information will not be illegally amended, illegally wiretapped and destructed during transmission, this paper presents a secure network communications model on the basis of public-key and double identity authentication. The model not only ensured the confidentiality...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.