ezHPC security architecture

被引:0
|
作者
Moncrief, George [1 ]
Townsend, Trent [1 ]
Swillie, Scotty [1 ]
机构
[1] USACE, Engn Res & Dev Ctr, Major Shared Resource Ctr, Vicksburg, MS USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
High performance computing (HPC) within the Department of Defense (DoD) is vital to the execution of the research and development mission. However, users must access these resources using interfaces that are complicated, specialized, primitive, and opaque. ezHPC was developed to address this complexity. The ezHPC project is interesting in that it abstracts for the user many of the technical details and tools related to HPC within the DoD High Performance Computing Modernization Program (HPCMP) while providing a Web-based application that allows user access to HPC resources. Leveraging open-source, widely available technology, the ezHPC security model addresses the DoD security requirements for authentication, confidentiality, availability, and integrity. This paper discusses an architecture that employs end-to-end encryption, open-source technologies, message authentication codes, and authentication of users via the HPCMP-modified implementation of the Massachusetts Institute Of Technology Kerberos. This architecture provides ezHPC the flexibility to reduce the technology barrier to those unfamiliar with interactive use of HPC systems while providing significant capability to more advanced users. The subsequent abstraction of HPC resources constitutes a security model for any Web-enabled application programming interface.
引用
收藏
页码:422 / 426
页数:5
相关论文
共 50 条
  • [21] A security architecture for the Internet Protocol
    Cheng, PC
    Garay, JA
    Herzberg, A
    Krawczyk, H
    IBM SYSTEMS JOURNAL, 1998, 37 (01) : 42 - 60
  • [22] Scheduling of Security Resources in Software Defined Security Architecture
    Zhang, Gang
    Qiu, Xiaofeng
    Chang, Wei
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 494 - 503
  • [23] Application of Java']Java Security Architecture in Information Security
    Shen Guicheng
    Zheng Xuefeng
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE OF MODELLING AND SIMULATION, VOL III: MODELLING AND SIMULATION IN ELECTRONICS, COMPUTING, AND BIO-MEDICINE, 2008, : 66 - 69
  • [24] Architecture Security Evaluation Method based on Security of the Components
    Du, Changxiao
    Li, Xiaohong
    Shi, Hong
    Hu, Jing
    Feng, Ruitao
    Feng, Zhiyong
    2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1, 2013, : 523 - 528
  • [25] A security architecture for reputation systems
    Ismail, R
    Boyd, C
    Josang, A
    Russell, S
    E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 176 - 185
  • [26] Wireless network security architecture
    Blumenthal, U
    Marcovici, M
    Mizikovsky, S
    Patel, S
    Sundaram, GS
    Wong, M
    BELL LABS TECHNICAL JOURNAL, 2002, 7 (02) : 19 - 36
  • [27] Agent platform security architecture
    Santana, G
    Sheremetov, LB
    Contreras, M
    COMPUTER NETWORK SECURITY, 2003, 2776 : 457 - 460
  • [28] Towards a security architecture for substations
    Fuloria, Shailendra
    Anderson, Ross
    2011 2ND IEEE PES INTERNATIONAL CONFERENCE AND EXHIBITION ON INNOVATIVE SMART GRID TECHNOLOGIES (ISGT EUROPE), 2011,
  • [29] Security Architecture in the SILVANUS project
    Orzechowski, Natan
    Rzepka, Karol
    Szary, Przemyslaw
    Cabaj, Krzysztof
    Mazurczyk, Wojciech
    Leligou, Nelly
    Przybyszewski, Marcin
    Kozik, Rafal
    Choras, Michal
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [30] The Research of the Cloud Security Architecture
    Hu Xiangyi
    Ma Zhanguo
    Liu Yu
    INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 379 - 385