Access the full text.
Sign up today, get DeepDyve free for 14 days.
A. Ferrari, Frederick Knabe, M. Humphrey, S. Chapin, A. Grimshaw (1999)
A Flexible Security System for Metacomputing Environments
Eshwar Belani, Amin Vahdat, T. Anderson, M. Dahlin (1998)
The CRISIS Wide Area Security Architecture
G. Cancio, S. Fisher, T. Folkes, F. Giacomini, W. Hoschek, D. Kelsey, B. Tierney
The DataGrid Architecture
Ian Foster, C. Kesselman, G. Tsudik, S. Tuecke (1998)
A security architecture for computational grids
The Grid is widely seen as the next generation Internet. Aims to share dynamic collections of individuals, institutions and resources by providing consistent, easy and inexpensive access to high‐end computational capabilities. Studies Grid security and specifically users' access control. It has been proved that the viability of these heterogeneous environments is highly dependent on their security design. Solutions trying to address all aspects of security were proposed by most existing Grid projects and collaborations; however the results were not always satisfactory. Reviews some of the most widely‐accepted security solutions, and collects the most efficient. Emphasizes access control procedures and the solutions addressing authentication and authorization issues. Identifies the most successful security schemes implemented and illustrates their effectiveness. Collects these mechanisms to form the backbone of a security mechanism, addressing authentication and authorization Grid‐specific problems. The proposed schemes can constitute the backbone of an effective Grid security architecture.
Internet Research – Emerald Publishing
Published: Dec 1, 2004
Keywords: Computer networks; Control systems; Message authentication; Data security
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.