期刊文献+

计算网格中访问控制策略研究与应用 被引量:2

Research and Application on Access Control Policy Based on Computing Grid
下载PDF
导出
摘要 网格是未来分布式计算的主要发展方向,而网格安全不仅是网格推广应用的前提,也是计算网格中的一个核心问题。通过对网格安全需求进行分析,从不同角度观察网格安全,抽象出网格安全模型的物理视图和逻辑视图。重点研究了网格环境中访问控制策略与授权策略。结合网格安全项目的研究,设计并实现了利用网格安全认证、访问控制策略进行P2P分布式计算的应用实例。 Grid is the main developing direction of future distributed computing. Grid security is not only the premise of grid wide application, but also one of the main problems of computational grids. Through analysis of the need of grid security, checking grid security by different aspects, the physical and logic views of grid security model were presented. Then the access control policy and authority policy of grid computing was emphatically researched. At last, an application instance of P2P distributed computing with grid security certification and access control policy were designed and implemented by combining with the research project of grid security.
出处 《计算机技术与发展》 2006年第8期231-234,共4页 Computer Technology and Development
基金 国家自然科学基金(60573141 70271050) 江苏省自然科学基金(BK2005146) 江苏省自然科学基金预研项目(BK2004218) 江苏省高技术研究计划(BG2004004 BG2005038) 江苏省计算机信息处理技术重点实验室基金(kjs050001) 安徽师范大学校青年基金资助项目(2005xqn05)
关键词 网格安全 访问控制 认证 P2P grid security access control certification P2P
  • 相关文献

参考文献8

  • 1FOSTERI KESSELMANC.网格计算[M].北京电子工业出版社,2004..
  • 2Foster I,Kesselman C,Tsudik G,et al.A security Architecture for Computational Grids[A].Proc 5th ACM Conference on Computer and Communications Security Conference[C].USA:ACM Press,1998.83-92.
  • 3Foster I,Kesselman C,Tuecke S.The Anatomy of the Grid:Enabling Scalable Virtual Organizations[J].International Journal of High Performance Computing Applications,2001,15(3):200 -222.
  • 4Welch V,Siebenlist F,Foster I,et al.Security for Grid services[A].In:Proc 12th IEEE International Symposium on High Performance Distributed Computing[C].Seattle,WA,USA:IEEE Computer Society,2003.48-57.
  • 5Nagaratnam N,Nadalin A,Janson P,et al.Security Architecture for Open Grid Services[Z].OGSA Security Workgroup,2003.
  • 6Housley R,Polk W,Ford W,et al.Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile[S].RFC 3280,2002.
  • 7Flenner R,Abbott M,Boubez T.Java P2P技术内幕[M].北京:人民邮电出版社.2003.
  • 8Johnston W E,Jackson K R,Talwar S.Overview of security considerations for computational and data grids[A].In:Proc 10th IEEE International Symposium on High Performance Distributed Computing[C].San Francisco,CA,USA:IEEE Computer Society,2001.439-440.

共引文献12

同被引文献16

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部