ezHPC security architecture

被引:0
|
作者
Moncrief, George [1 ]
Townsend, Trent [1 ]
Swillie, Scotty [1 ]
机构
[1] USACE, Engn Res & Dev Ctr, Major Shared Resource Ctr, Vicksburg, MS USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
High performance computing (HPC) within the Department of Defense (DoD) is vital to the execution of the research and development mission. However, users must access these resources using interfaces that are complicated, specialized, primitive, and opaque. ezHPC was developed to address this complexity. The ezHPC project is interesting in that it abstracts for the user many of the technical details and tools related to HPC within the DoD High Performance Computing Modernization Program (HPCMP) while providing a Web-based application that allows user access to HPC resources. Leveraging open-source, widely available technology, the ezHPC security model addresses the DoD security requirements for authentication, confidentiality, availability, and integrity. This paper discusses an architecture that employs end-to-end encryption, open-source technologies, message authentication codes, and authentication of users via the HPCMP-modified implementation of the Massachusetts Institute Of Technology Kerberos. This architecture provides ezHPC the flexibility to reduce the technology barrier to those unfamiliar with interactive use of HPC systems while providing significant capability to more advanced users. The subsequent abstraction of HPC resources constitutes a security model for any Web-enabled application programming interface.
引用
收藏
页码:422 / 426
页数:5
相关论文
共 50 条
  • [31] A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS
    Behrens, Reinhard
    Ahmed, Ali
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6092 - 6115
  • [32] European Security Architecture at Risk?
    Wiersma, Jan Marinus
    SECURITY AND HUMAN RIGHTS, 2014, 25 (03) : 345 - 354
  • [33] Windows NT security architecture
    Inf Secur Tech Rep, 3 (15-22):
  • [34] Integrated security architecture for WLAN
    Carli, M
    Rossetti, A
    Neri, A
    ICT'2003: 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, VOLS I AND II, CONFERENCE PROCEEDINGS, 2003, : 943 - 947
  • [35] Security solutions: Strategy and architecture
    Seto, M
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES IV, 2002, 4677 : 314 - 317
  • [36] Elements of a new security architecture
    Muenkler, Herfried
    INTERNATIONALE POLITIK, 2007, 62 (05): : 6 - 14
  • [37] Security architecture for web services
    Rao, Y
    Feng, BQ
    Han, JC
    GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 341 - 347
  • [38] An Architecture for Differentiated Security Service
    Chen, Jianyong
    Wang, Xiaomin
    He, Liwen
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 301 - +
  • [39] India and the Asian security architecture
    Sahni, V
    CURRENT HISTORY, 2006, 105 (690): : 163 - 168
  • [40] Make Security the Predominant Architecture
    Schaefer, Georg E.
    COMMUNICATIONS OF THE ACM, 2014, 57 (10) : 8 - 8