ezHPC security architecture

被引:0
|
作者
Moncrief, George [1 ]
Townsend, Trent [1 ]
Swillie, Scotty [1 ]
机构
[1] USACE, Engn Res & Dev Ctr, Major Shared Resource Ctr, Vicksburg, MS USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
High performance computing (HPC) within the Department of Defense (DoD) is vital to the execution of the research and development mission. However, users must access these resources using interfaces that are complicated, specialized, primitive, and opaque. ezHPC was developed to address this complexity. The ezHPC project is interesting in that it abstracts for the user many of the technical details and tools related to HPC within the DoD High Performance Computing Modernization Program (HPCMP) while providing a Web-based application that allows user access to HPC resources. Leveraging open-source, widely available technology, the ezHPC security model addresses the DoD security requirements for authentication, confidentiality, availability, and integrity. This paper discusses an architecture that employs end-to-end encryption, open-source technologies, message authentication codes, and authentication of users via the HPCMP-modified implementation of the Massachusetts Institute Of Technology Kerberos. This architecture provides ezHPC the flexibility to reduce the technology barrier to those unfamiliar with interactive use of HPC systems while providing significant capability to more advanced users. The subsequent abstraction of HPC resources constitutes a security model for any Web-enabled application programming interface.
引用
收藏
页码:422 / 426
页数:5
相关论文
共 50 条
  • [41] VoIProtect: A Layered Security Architecture
    Raval, Gauravkumar
    Pal, Amitava
    ISM: 2008 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, 2008, : 412 - +
  • [42] Transforming security requirements into architecture
    Yskout, Koen
    Scandariato, Riccardo
    De Win, Bart
    Joosen, Wouter
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1421 - 1428
  • [43] A Research of Security Architecture in Grid
    Zhu, Youchan
    Zhang, Xiaofang
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [44] Fujitsu enterprise security architecture
    Shiozaki, Tetsuo
    Okuhara, Masayuki
    Yoshikawa, Nobuo
    Fujitsu Scientific and Technical Journal, 2007, 43 (02): : 153 - 158
  • [45] A security architecture for personal networks
    Jehangir, Assed
    de Groot, Sonia M. Heemstra
    2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 276 - +
  • [46] Carrier VoIP security architecture
    Marshall, William
    Faryar, Alireza Farid
    Kealy, Kevin
    de los Reyes, Gustav
    Rosencrantz, Israel
    Rosencrantz, Rachel
    Spielman, Chaim
    Networks 2006, 12th International Telecommunications Network Strategy and Planning Symposium, 2006, : 184 - 189
  • [47] A security architecture for personal networks
    Jehangir, Assed
    Heemstra de Groot, Sonia M.
    2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 265 - +
  • [48] Towards a configurable security architecture
    Olivier, MS
    DATA & KNOWLEDGE ENGINEERING, 2001, 38 (02) : 121 - 145
  • [49] What is Asian security architecture?
    Tow, William T.
    Taylor, Brendan
    REVIEW OF INTERNATIONAL STUDIES, 2010, 36 (01) : 95 - 116
  • [50] The need for a digital security architecture
    Heschl, Jimmy
    ISACA Journal, 2019, 5 : 33 - 41