• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
FANG Juan, LIANG Wen-can. Design and Analysis of Grid Portal Security Architecture[J]. Journal of Beijing University of Technology, 2009, 35(4): 532-536. DOI: 10.3969/j.issn.0254-0037.2009.04.019
Citation: FANG Juan, LIANG Wen-can. Design and Analysis of Grid Portal Security Architecture[J]. Journal of Beijing University of Technology, 2009, 35(4): 532-536. DOI: 10.3969/j.issn.0254-0037.2009.04.019

Design and Analysis of Grid Portal Security Architecture

More Information
  • Received Date: November 15, 2007
  • Available Online: December 06, 2022
  • To improve the security capability for gird portal that is accessed by ordinary users jobs and to guarantee that portal have a secure access to gird resource is very important.According to the feature of grid portal, we design and analyze a safe portal mechanism with Globus Toolkit middleware technology to implement an architecture.We achieve both a credential processing architecture and gird portal credential security architecture.The experiment result shows that through this kind of design and analysis of gird portal, we could protect the safety of grid portal itself well.In addition, this architecture would ensure that every grid computing resource that is accessed by portal through grid can be safe as well.
  • [1]
    ARNIN K, HATEGAN M, VON L G.Abstracting the grid[C]//Proceedings of the 12th Euromicro Conference on Parallel, Distributed and Network-Based Processing.New Jersey:Institute of Electrical and Electronics Engineers Inc, 2004:250-257.
    [2]
    THOMAS M, MOCK S.The grid port toolkit:a system for building grid portals[C]//High Performance Distributed Computing.New Jersey:Institute of Electrical and Electronics Engineers Inc, 2001:216-127.
    [3]
    CHANG V.Integrated use of web technologies to deliver a secure collaborative web portal[C]//ITRE 2005.3rd International Conference on Information Technology:Research and Education.New Jersey:Institute of Electrical and Electronics Engineers Inc, 2005:141-145.
    [4]
    CHOLAKOV N, MILEV D.The evolution of the java security model[C]//Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing.Bulgaria:Bulgarian Chapter of ACM, 2005:2-14.
    [5]
    VECCHIO D D, HAZLEWOOD V, HUMPHREY M.Evaluating grid portal security[C]//Proceedings of the 2006 ACM/IEEE SC|06 Conference.New York:Association for Computing Machinery, 2006:27-41.
    [6]
    BALDONI M, BOELLA G, VAN D T.Interaction among objects via roles:sessions and affordances in java[C]//The 4th International Conference on Principles and Practices of Programming in Java.New York:Association for Computing Machinery, 2006:188-193.
    [7]
    FOSTER I.The globus toolkit for grid computing[C]//Cluster Computing and the Grid.New Jersey:Institute of Electrical and Electronics Engineers Inc, 2001:1-2.
    [8]
    FOSTER I, KARONIS N T, KESSELMAN C, et al.Managing security in high-performance distributed computing[J]. Cluster Computing, 1998, 1(1):96-107.
    [9]
    NOVOTNYJ, TUECKE S, WELCH V.An online credential for the grid:myproxy[C]//Proceedings of the Tenth International Symposium on High Performance Distributed Computing(HPDC210).New Jersey:Institute of Electrical and Electronics Engineers Inc, 2001:104-114.
    [10]
    NOVOTNY J, RUSSEL M, WEHRENS O.GridSphere:A portal framework for building collaborations[J].Middleware for Grip Computing, 2004, 16(5):503-513.

Catalog

    Article views (13) PDF downloads (7) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return