Research and implementation of grid security mode based on identity authentication

被引:0
|
作者
Li, Ma [1 ]
Zheng Weimin [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
关键词
grid security; authorization framework; security protection;
D O I
10.1109/ICINIS.2008.123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Grid is an open distributed system environment, whose purpose is to provide for sharing the resources between virtual organizations with distributed, heterogeneous, dynamic characteristics, so, grid has been paid much respect in the world. Security is one of the key factors in grid environment, and it is a basic guarantee to realize the goal in grid. Grid security means legal users may legally employ grid resources, and the information of users and resources can be safely transferred in grid. The safe requests in all open system environment can be used in grid environment, and in addition, safety realization in grid environment faces the new challenge due to a special goal. Open Grid Service Architecture (OGSA) is a kind of grid structure standard recommended by Global Grid Forum (GGF), while OGSA combines existing grid standards with standards of Web services, and it is a typical representation of the third generation grid because of OGSA's service centered feature. OGSA, the basic criterion of definition grid services, offers consistent resource visiting interface based on the abstract generalization of resources through the concept of grid services and shielding resource heterogeneity, and it is a standard protocol and infrastructure of OGSA. Research identifies of grid security at home and abroad is thoroughly analyzed, and its advantages and disadvantages are summarized. Finally, the security model and the authentication, authorization framework of open grid environment are presented; the security protocols and infrastructures of the OGSA grid service are discussed.
引用
收藏
页码:499 / 503
页数:5
相关论文
共 50 条
  • [31] The Design of Smart Grid Identity Authentication System Based on Fingerprint Identification
    Wang, Xiuqing
    Zhao, Jimin
    Qiao, Xueying
    Che, Fangyuan
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND OPTIMIZATION TECHNOLOGIES AND APPLICATIONS (MSOTA2016), 2016, 58 : 397 - 399
  • [32] The Research and Design of Identity Authentication Based on Speech Feature
    Ma, Hongbin
    Yan, Shuang
    Bai, Xue
    Zhu, Yong
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 166 - 169
  • [33] Research of Identity Metasystem Based Authentication Mechanism in SOA
    Wen, Jun Hao
    Li, Peng
    Ren, Hai Jun
    Tang, Fang Fang
    INFORMATION AND MANAGEMENT ENGINEERING, PT V, 2011, 235 : 56 - +
  • [34] Face security authentication based on specific expression action mode
    Wang, Meng
    Liu, Qingqing
    Sun, Mei
    Cheng, Xiaotong
    SECOND INTERNATIONAL CONFERENCE ON OPTICS AND IMAGE PROCESSING (ICOIP 2022), 2022, 12328
  • [35] A key agreement scheme for identity authentication based on multiple security factors
    Wang, Ying, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18):
  • [36] Identity Based Security for Authentication and Mobility in Future ID Oriented Networks
    Wan, Rongfei
    Da, Bin
    Li, Richard
    Wang, Chuang
    Li, Hongpei
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 402 - 407
  • [37] A key agreement scheme for identity authentication based on multiple security factors
    Wang Y.
    Peng X.
    Bian J.
    Int. J. Simul. Syst. Sci. Technol., 3 (13.1-13.7): : 13.1 - 13.7
  • [38] The identity authentication of Wi-Fi system based on network security
    Tao, Hao
    ANNALS OF TELECOMMUNICATIONS, 2021, 76 (5-6) : 313 - 320
  • [39] The identity authentication of Wi-Fi system based on network security
    Hao Tao
    Annals of Telecommunications, 2021, 76 : 313 - 320
  • [40] A RESEARCH OF GRID SECURITY ARCHITECTURE BASED ON OGSA
    Zhu, Youchan
    Zhang, Xiaofang
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 585 - 589