A grid portal model based on security and storage resource proxy

被引:0
|
作者
Zhou, Q [1 ]
Yang, G [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Dept Comp Sci & Technol, Nanjing 210003, Peoples R China
关键词
grid computing; grid portal; security proxy; storage and data management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Grid computing is recently developed concept in high performance computing. Security and resource management is the two key technologies in a grid. In this paper, we describe a grid portal model based on security proxy and storage resource broker. We set up a testing environment and make some improvements to the proxy model. We also point out several disadvantages of current mechanism, and make some corresponding improvements.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [31] The Grid resource discovery method based on hierarchical model
    Yin, Yulan
    Cui, Huanqing
    Chen, Xin
    Information Technology Journal, 2007, 6 (07) : 1090 - 1094
  • [32] Ecosystem Model Based Grid Resource Optimization Management
    Wang, Yunlan
    Wang, Tao
    Tang, Lei
    Zhong, Dong
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (02): : 61 - 66
  • [33] RESOURCE ALLOCATION ANALYSIS MODEL BASED ON GRID ENVIRONMENT
    Lee, Huey-Ming
    Su, Jin-Shieh
    Chung, Chia-Hsien
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (5A): : 2099 - 2108
  • [34] Grid resource model based on Hyper topology space
    Lu, Bin
    2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 878 - 882
  • [35] Resource demand prediction-based grid resource transaction network model in grid computing environment
    Kim, In Kee
    Lee, Jong Sik
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5, 2006, 3984 : 1 - 9
  • [36] GRISSOM web based Grid portal: Exploiting the power of Grid infrastructure for the interpretation and storage of DNA microarray experiments
    Chatziioannou, Aristotelis
    Kanaris, Ioannis
    Maglogiannis, Ilias
    Doukas, Charalampos
    Moulos, Panagiotis
    Pilalis, Eleftherios
    Kolisis, Fragiskos
    2009 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS IN BIOMEDICINE, 2009, : 526 - +
  • [37] Role delegation for a resource-based security model
    Liebrand, M
    Ellis, H
    Phillips, C
    Demurjian, S
    Ting, TC
    Ellis, J
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 37 - 48
  • [38] A multilayer portal model for information grid
    Chen, Xiaowu
    Chen, Mingji
    Luo, Xixi
    PROCEEDINGS OF THE THIRD CHINAGRID ANNUAL CONFERENCE, 2008, : 78 - 85
  • [39] Application Layer Security Proxy for Smart Grid Substation Automation Systems
    Wei, Dong
    Darie, Florin
    Shen, Ling
    2013 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES (ISGT), 2013,
  • [40] A Formal Model for the Security of Proxy Signature Schemes
    GU Chun-xiang
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 275 - 278