ezHPC security architecture

被引:0
|
作者
Moncrief, George [1 ]
Townsend, Trent [1 ]
Swillie, Scotty [1 ]
机构
[1] USACE, Engn Res & Dev Ctr, Major Shared Resource Ctr, Vicksburg, MS USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
High performance computing (HPC) within the Department of Defense (DoD) is vital to the execution of the research and development mission. However, users must access these resources using interfaces that are complicated, specialized, primitive, and opaque. ezHPC was developed to address this complexity. The ezHPC project is interesting in that it abstracts for the user many of the technical details and tools related to HPC within the DoD High Performance Computing Modernization Program (HPCMP) while providing a Web-based application that allows user access to HPC resources. Leveraging open-source, widely available technology, the ezHPC security model addresses the DoD security requirements for authentication, confidentiality, availability, and integrity. This paper discusses an architecture that employs end-to-end encryption, open-source technologies, message authentication codes, and authentication of users via the HPCMP-modified implementation of the Massachusetts Institute Of Technology Kerberos. This architecture provides ezHPC the flexibility to reduce the technology barrier to those unfamiliar with interactive use of HPC systems while providing significant capability to more advanced users. The subsequent abstraction of HPC resources constitutes a security model for any Web-enabled application programming interface.
引用
收藏
页码:422 / 426
页数:5
相关论文
共 50 条
  • [1] ezHPC: Adopting a program-wide, user-centered design approach to the ezHPC user interface
    Baca, Julie
    Monceaux, Wes
    Rappold, Keith
    Duett, Patti
    Buchanan, Kimba
    Swillie, Scotty
    Browning, Glen
    PROCEEDINGS OF THE HPCMP USERS GROUP CONFERENCE 2007, 2007, : 382 - +
  • [2] A security architecture for data privacy and security
    Weaver, Alfred C.
    ETFA 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 1, PTS 1 AND 2, PROCEEDINGS, 2005, : 673 - 676
  • [3] EZHPC: Easy access to high performance computing
    Duett, P
    Monceaux, W
    Rappold, K
    USERS GROUP CONFERENCE, PROCEEDINGS, 2004, : 289 - 292
  • [4] REALIZING A SECURITY ARCHITECTURE
    LECLERC, M
    LUKAS, K
    IFIP TRANSACTIONS C-COMMUNICATION SYSTEMS, 1992, 1 : 421 - 426
  • [5] IT architecture for homeland security
    Metz, Gerald S.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 292 - 298
  • [6] INDECT Security Architecture
    Uruena, Manuel
    Machnik, Petr
    Niemiec, Marcin
    Stoianov, Nikolai
    MULTIMEDIA COMMUNICATIONS, SERVICES AND SECURITY, MCSS 2013, 2013, 368 : 273 - 287
  • [7] CATV security architecture
    Volner, R
    36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 209 - 215
  • [8] Internet security architecture
    Molva, R
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 787 - 804
  • [9] A knowledge architecture - for IT security
    Kesh, Someswar
    Ratnasingam, Pauline
    COMMUNICATIONS OF THE ACM, 2007, 50 (07) : 103 - 108
  • [10] Agile security using an incremental security architecture
    Chivers, H
    Paige, RF
    Ge, XC
    EXTREME PROGRAMMING AND AGILE PROCESSES IN SOFTWARE ENGINEERING, PROCEEDINGS, 2005, 3556 : 57 - 65