7 Matching Results

Search Results

Advanced search parameters have been applied.

Security on the US Fusion Grid

Description: The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.
Date: June 1, 2005
Creator: Burruss, Justin R.; Fredian, Tom W. & Thompson, Mary R.
Partner: UNT Libraries Government Documents Department

Securing Resources in Collaborative Environments: A Peer-to-peerApproach

Description: We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.
Date: September 19, 2005
Creator: Berket, Karlo; Essiari, Abdelilah & Thompson, Mary R.
Partner: UNT Libraries Government Documents Department

Security Implications of Typical Grid Computing Usage Scenarios

Description: A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Computational Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios are presented and analyzed with regard to security requirements such as authentication, authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions are to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios are to increase the awareness of security issues in Grid Computing.
Date: June 5, 2001
Creator: Humphrey, Marty & Thompson, Mary R.
Partner: UNT Libraries Government Documents Department

Data security on the national fusion grid

Description: The National Fusion Collaboratory project is developing and deploying new distributed computing and remote collaboration technologies with the goal of advancing magnetic fusion energy research. This work has led to the development of the US Fusion Grid (FusionGrid), a computational grid composed of collaborative, compute, and data resources from the three large US fusion research facilities and with users both in the US and in Europe. Critical to the development of FusionGrid was the creation and deployment of technologies to ensure security in a heterogeneous environment. These solutions to the problems of authentication, authorization, data transfer, and secure data storage, as well as the lessons learned during the development of these solutions, may be applied outside of FusionGrid and scale to future computing infrastructures such as those for next-generation devices like ITER.
Date: June 1, 2005
Creator: Burruss, Justine R.; Fredian, Tom W. & Thompson, Mary R.
Partner: UNT Libraries Government Documents Department

Security for Grids

Description: Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.
Date: August 14, 2005
Creator: Humphrey, Marty; Thompson, Mary R. & Jackson, Keith R.
Partner: UNT Libraries Government Documents Department

Authorization policy in a PKI environment

Description: The major emphasis of Public Key Infrastructure has been to provide a cryptographically secure means of authenticating identities. While there are a number of proposed standards for authorization structures and protocols based on X.509 or other key-based identities, none have been widely adopted. As part of an effort to use X.509 identities to provide authorization in highly distributed environments, we have developed and deployed an authorization service based on X.509 identified users and access policy contained in certificates signed by X.509 identified stakeholders. The major goal of this system, called Akenti, is to produce a usable authorization system for an environment consisting of distributed resources used by geographically and administratively distributed users.
Date: April 10, 2002
Creator: Thompson, Mary R.; Mudumbai, Srilekha S.; Essiari, Abdelilah & Chin, Willie
Partner: UNT Libraries Government Documents Department

Fine-grained authorization for job and resource management usingakenti and the globus toolkit(R)

Description: As the Grid paradigm is adopted as a standard way of sharing remote resources across organizational domains, the need for fine-grained access control to these resources increases. This paper presents an authorization solution for job submission and control, developed as part of the National Fusion Collaboratory, that uses the Globus Toolkit 2 and the Akenti authorization service in order to perform fine-grained authorization of job and resource management requests in a Gridenvironment. At job startup, it allows the system to evaluate a user's Resource Specification Language request against authorization policies on resource usage determining how many CPUs or memory a user can use on a given resource or which executables the user can run based on authorization policies, it allows other virtual organization members to manage the user's job.
Date: July 1, 2003
Creator: Thompson, Mary R.; Essiari, Abdelilah; Keahey, Kate; Welch, Von; Lang, S. & Liu, Bo
Partner: UNT Libraries Government Documents Department