期刊文献+

网格计算中的安全问题探讨 被引量:1

Discussion on the security problems of grid computing
下载PDF
导出
摘要 介绍了网格计算环境的特点、安全需求及其安全问题研究现状,对网格计算中的安全标准、安全认证、公有与私有资源的安全利用、应用安全、恶意攻击的检测与防范等安全问题进行了分析和讨论,提出了在研究和解决网格计算的安全问题时,一方面可以借鉴传统网络的安全策略和技术并加以改进,另一方面要充分考虑网格计算环境的特殊性,研究和构建“特殊的安全策略和技术”。 This paper introduces the characteristics, security demands, and the current situation of the security problems of grid computing, analyzes and discusses some security problems, such as security standard, security authentication, security utilizing of public and private resources, security of applications, detection and precaution of intentional intrusion etc. It points out that the security tactics and techniques of traditional network can be used, at the same time the specialties of grid computing circumstance should be considered sufficiently in order to research and setup the "special safety tactics and techniques" in studing and solving the security problems of grid computing.
作者 孟晓明
出处 《信息技术》 2006年第4期28-31,共4页 Information Technology
基金 广东商学院自然科学资助项目(20044410592K03)
关键词 网格 网格计算 网络安全 grid grid computing network security
  • 相关文献

参考文献10

二级参考文献79

  • 1鞠子燕,韩文报.网格资源的安全管理技术[J].高性能计算技术,2004,0(3):30-33. 被引量:2
  • 2徐志伟.互联网涅正在浮现的网格技术[J].互联网世界,2001,(11):22-27.
  • 3FOSTER I, KESSELMAN C.The Grid: Blueprint for a New Computing Infrastructure[M] .San Francisco:Morgan Kaufmann, 1999.
  • 4FOSTER I, KESSELMAN C,TUECKE S. The Anatomy of the Grid:Enabling scalable virtual organizations [J] . Int' 1 J High-Performance computing Applications,2001,15(3) :200 - 222.
  • 5FOSTER I. A security architecture for computational grids[ A]. Proc 5th ACM Conference on Computer and Communications Security Conference[ C] .199S.83 -92.
  • 6GRIMSHAW A, FERRARI A, KNABE F, et al. LEGION: An Operationg System for Wide Afra Computing[ EB/OL]. ftp://ftp. cs. virginia. edu/pub/techreports/CS-99-12. ps. Z and The Legion Project:http ://legion. virginia. edu.
  • 7FOSTER I, KESSELMAN C. The Globus Project: A Status Report [A].Proc IPPS3/SPDP '98 Heterogeneous Computing Workshop [C]. 1998.4-18.
  • 8WANG Ruchuan, MU Hong. Building grid computing environment with mobile agent technology[A] .Proceedings of the International Workshop on Grid and Cooperative Computing [ C ] . ( GCC2002 ) December 26-28,2002.1075 - 1084.
  • 9CHANG B, CRARY K, DELAP M, et aI. Trustless grid computing in Concert[ A]. Grid Computing-Grid 2002 Third International Workshop[ C ]. Berlin Springer-Verlag, Nov, 2002.112 - 125.
  • 10VOLLBRECHT J, CAIMOUN P, FARRELL S, et al. Network Working Group RFC 2904.AAA authorization framework[ S] .August,2000.

共引文献71

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部