期刊文献+

网格安全体系结构及GSI安全策略研究 被引量:3

Research on Grid Security Architecture and GSI Security Policy
下载PDF
导出
摘要 描述了网格系统的理想体系结构,分析网格安全需求和安全目标,并提出了一个5层安全体系结构。最后,通过分析GSI安全策略,对主要的GSI安全问题进行讨论并提出了设计算法。 This paper describes perfect architecture of Grid system, analyzes security requirements and security goals of Grid system, and presents a five-layer security architecture. Finally, through anlyzing security policis of Grid system, it discusses the main security problems on GSI and presents the algorithms.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第17期133-135,共3页 Computer Engineering
关键词 网格系统 理想体系结构 安全体系结构 GSI 安全策略 Grid system Perfect architecture Security architecture Globus security infrastructure(GSI) Security policy
  • 相关文献

参考文献7

  • 1Foster I, Kesselman C. The Grid: Blueprint for a New Computing Infrastructure [M]. Morgan Kaufmann Publishers, Inc., San Francisco, California, 1999: 205-236. 被引量:1
  • 2应宏.网格系统基础及其应用展望[J].微机发展,2003,13(11):99-103. 被引量:25
  • 3Foster I, Kesselman C, Tuecke S. The Anatomy of the Grid: Enabling Scalable Virtual Orgnization [J]. International Journal of Supercom- puter Applications, 2001, 15(6): 200-222. 被引量:1
  • 4Pearlman L, Welch V, Foster I, et al. A Community Authorization Service for Group Collaboration [R]. In: IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, 2001. 被引量:1
  • 5Foster I, Karonis N T, Kesselman C, et al. Managing Security in High-performance Distributed Computing [J]. Cluster Computing, 1998, 1(1): 95-107. 被引量:1
  • 6Foster I, Kesselman C, Tsudik G, et al. A Security Architecture for Computational Grids [R]. In: Proc. of 5th ACM Conference on Computer and Communications Security Conference, 1998: 83-92. 被引量:1
  • 7Butler R, Engert D, Foster I, et al. A National-scale Authentication Infrastructure [J]. IEEE Computer, 2000, 33(12):60-66. 被引量:1

二级参考文献6

共引文献24

同被引文献6

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部