The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Grid Information Service (GIS) is an entity that gathers the latest information about the grid resources. These resources information are then retrieved by the grid users or brokers prior to planning task deployment in a grid environment. Hence, the GIS frequently communicate with the resources for their latest status, and hardware and software specifications. This creates the need for timely and...
Combined with the grid development, this article analyzed the current widespread adoption of authentication mechanisms and researched GSI program and KX.509 program in different grid environment. With the proxy idea of KX.509, using and implementing a Web-login module to build the grid authentication model in the Globus environment. The module provides the transparent user certificate generation,...
A grid portal is one of the most important ways to access grid systems. The disadvantages existing in current grid portals are that they are designed for specific applications, difficult to add new applications. Besides, the security issues are not considered fully in these portals. In this paper, we proposed a user-centric and secure grid portal architecture-USGPA based on portlet. In USGPA, a security...
Security is the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of some particular purpose. Data security ensures that kind of private and sensitive data from corruption and the access to it is suitably controlled. Enterprise businesses and government agencies around the world face the certainty of losing sensitive data from...
The distributed computing system researches are active in various areas. It is the system to perform the operation in the various areas, for example, science and art and cryptography. We present security mechanism consisted of three phases: the simple authentication, the strong authentication and the rapid authentication. Additionally we designed the mechanism of scheduling for multi-job operation...
Grid users and their jobs need credentials to access grid resources and services. It is important to minimize the exposure of credentials to adversaries. A practical solution is needed that works with existing software and is easy to deploy, administer, and maintain. Thus, credential management services are the wave of the future for virtual organizations such as Grid computing. This paper describes...
Privacy of message during transactions between grid nodes belonging to public realm has become a mounting apprehension for nodes engaged in the communication. While it is imperative to ensure a high level of security for geographically dispersed distributed nodes, privacy issues for concealing individual profiles and identities are worth concerning. Privacy in the user profile management is prime...
This research proposes job request management system (JRMS) which is robust against network coverage and battery power failure and manages the request messages on the local storage media while mobile disconnection or battery power failure. Password-based authentication system and lightweight Blowfish cryptography are used for secure data request transmission between the mobile device and the grid...
In modern Collaborative Manufacturing, different security mechanisms of systems bring usage complexities and security risks. Grid Security Infrastructure (GSI) enables secure authentication and communication over computer networks. It is designed and developed on the technology of Java GSS-API, JAAS, Kerberos. The key technologies such as integrating with application server are specially discussed...
Key management is a decisive part for security in wireless sensor networks. Pre-distribution of secret keys for all pairs of nodes is not viable due to the large amount of memory used when the number of sensor node is huge. Recently, a random key pre-distribution scheme is proposed as an efficient solution for sharing keys among sensor nodes to reduce the length of shared key and avoid unnecessary...
To realize the real-time exchange of grid network data information, ensure the security in the process of information transmission, ensure that information will not be illegally amended, illegally wiretapped and destructed during transmission, this paper presents a secure network communications model on the basis of public-key and double identity authentication. The model not only ensured the confidentiality...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.