The 6th IEEE/ACM International Workshop on Grid Computing, 2005.最新文献

筛选
英文 中文
Web-enabled grid authentication in a non-Kerberos environment 在非kerberos环境中启用web的网格身份验证
The 6th IEEE/ACM International Workshop on Grid Computing, 2005. Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542763
John-Paul Robinson, J. Gemmill, Pravin Joshi, P. Bangalore, Yiyi Chen, Silbia Peechakara, Song Zhou, Prahalad Achutharao
{"title":"Web-enabled grid authentication in a non-Kerberos environment","authors":"John-Paul Robinson, J. Gemmill, Pravin Joshi, P. Bangalore, Yiyi Chen, Silbia Peechakara, Song Zhou, Prahalad Achutharao","doi":"10.1109/GRID.2005.1542763","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542763","url":null,"abstract":"UABgrid is a collaboration between academic and administrative IT units at the University of Alabama at Birmingham (UAB). UABgrid provides a Web-based grid client environment, access to shared campus computational resources, and user identities defined by the authoritative campus identity provider. A Weblogin service leveraging UAB's authoritative identity directory is provided for grid authentication. Previous integrations of institutional identity management and grid authentication depended on a Kerberos environment and use of KX.509. We accomplish similar functionality in a non-Kerberos environment by leveraging our Weblogin service to drive applications which require grid credentials. The UABgrid registration process employs the Weblogin service to generate certificates and keys signed by our UABgridCA and automatically provisions accounts for UABgrid users based on resource center policies. After successful registration, UABgrid leverages the Weblogin service to allow users to access resources and to submit jobs using only a Web browser and their familiar username and password.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124403642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Adaptive trust negotiation and access control for grids 网格自适应信任协商与访问控制
The 6th IEEE/ACM International Workshop on Grid Computing, 2005. Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542724
T. Ryutov, Li Zhou, B. C. Neuman, N. Foukia, Travis Leithead, K. Seamons
{"title":"Adaptive trust negotiation and access control for grids","authors":"T. Ryutov, Li Zhou, B. C. Neuman, N. Foukia, Travis Leithead, K. Seamons","doi":"10.1109/GRID.2005.1542724","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542724","url":null,"abstract":"Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users and resources increase. Moreover, identity-based access control is not sufficient because users and resources may reside in different security domains and may not have pre-existing knowledge about one another. Trust negotiation is well-suited for grid computing because it allows participants to establish mutual trust based on attributes other than identity. The adaptive trust negotiation and access control (ATNAC) framework addresses the problem of access control in open systems by protecting itself from adversaries who may want to misuse, exhaust or deny service to resources. ATNAC is based on the GAA-API, which provides adaptive access control capturing dynamically changing system security requirements. The GAA-API utilizes TrustBuilder to establish a sufficient level of trust between the negotiating participants, based on the sensitivity of the access request and a suspicion level associated with the requester. A federated security context allows Grid participants to communicate their security appraisal and make judgments based on collective wisdom and the level of trust among them. We plan to apply ATNAC techniques to negotiation agreements in virtual organizations and P2P environments.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129709465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Legacy code support for production grids 对生产网格的遗留代码支持
The 6th IEEE/ACM International Workshop on Grid Computing, 2005. Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542754
T. Kiss, G. Terstyánszky, G. Kecskeméti, S. Illes, T. Delaittre, S. Winter, P. Kacsuk, G. Sipos
{"title":"Legacy code support for production grids","authors":"T. Kiss, G. Terstyánszky, G. Kecskeméti, S. Illes, T. Delaittre, S. Winter, P. Kacsuk, G. Sipos","doi":"10.1109/GRID.2005.1542754","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542754","url":null,"abstract":"In order to improve reliability and to deal with the high complexity of existing middleware solutions, today's production grid systems restrict the services to be deployed on their resources. On the other hand end-users require a wide range of value added services to fully utilize these resources. This paper describes a solution how legacy code support is offered as third party service for production grids. The introduced solution, based on the grid execution management for legacy code architecture (GEMLCA), do not require the deployment of additional applications on the grid resources, or any extra effort from grid system administrators. The implemented solution was successfully connected to and demonstrated on the UK National Grid Service.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122111013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
HIPernet: a decentralized security infrastructure for large scale grid environments HIPernet:用于大规模网格环境的分散安全基础设施
The 6th IEEE/ACM International Workshop on Grid Computing, 2005. Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542735
J. Laganier, P. Primet
{"title":"HIPernet: a decentralized security infrastructure for large scale grid environments","authors":"J. Laganier, P. Primet","doi":"10.1109/GRID.2005.1542735","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542735","url":null,"abstract":"Security in grid environments appeals for fundamental primitives like the secure establishment of dynamic and isolated virtual trust domains. The security mechanisms currently used are generally based on a public key infrastructure global to the grid environment, and a mix of global and local access control policies used to make an authorization decision. Such approaches do not scale well with the number of participating domains and entities. In this paper, we propose a decentralized approach for securing grid environments that better cope with their inherently distributed nature. The combination of network and operating system visualization (supernets) with the host identity protocol (HIP) and simple public key infrastructure (SPKI) delegation/authorization certificates allows to create virtual trust domains onto multiple shared computer nodes connected by an untrusted network. We analyze how this approach adapts the vast diversity of trust relationships in the real world and has a better scalability with respect to the number of entities involved.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132488244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A language-driven tool for fault injection in distributed systems 分布式系统中故障注入的语言驱动工具
The 6th IEEE/ACM International Workshop on Grid Computing, 2005. Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542742
William Hoarau, S. Tixeuil
{"title":"A language-driven tool for fault injection in distributed systems","authors":"William Hoarau, S. Tixeuil","doi":"10.1109/GRID.2005.1542742","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542742","url":null,"abstract":"In a network consisting of several thousands computers, the occurrence of faults is unavoidable. Being able to test the behavior of a distributed program in an environment where we can control the faults (such as the crash of a process) is an important feature that matters in the deployment of reliable programs. In this paper, we present FAIL (for FAult Injection Language), a language that permits to elaborate complex fault scenarios in a simple way, while relieving the user from writing low level code. Besides, it is possible to construct probabilistic scenarios (for average quantitative tests) or deterministic and reproducible scenarios (for studying the application's behavior in particular cases). We also present FCI, the FAIL cluster implementation, that consists of a compiler, a runtime library and a middleware platform for software fault injection in distributed applications. FCI is able to interface with numerous programming languages without requiring the modification of their source code, and the preliminary tests that we conducted show that its effective impact at runtime is low.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121231316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Web services and grid security vulnerabilities and threats analysis and model Web服务和网格安全漏洞和威胁分析和建模
The 6th IEEE/ACM International Workshop on Grid Computing, 2005. Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542751
Y. Demchenko, L. Gommans, C. D. Laat, B. V. Oudenaarde
{"title":"Web services and grid security vulnerabilities and threats analysis and model","authors":"Y. Demchenko, L. Gommans, C. D. Laat, B. V. Oudenaarde","doi":"10.1109/GRID.2005.1542751","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542751","url":null,"abstract":"The paper provides an overview of available Web services security vulnerability models and proposes a classification of the potential grid and Web services attacks and vulnerabilities. This is further used to introduce a security model for interacting grid and Web services that illustrates how basic security services should interact to provide an attack-resilient multilayer protection in a typical service-oriented architecture. The analysis and the model can be used as a basis for developing countermeasures against known vulnerabilities and security services design recommendations. The paper refers to the ongoing work on middleware and operational security in the framework of the European grid infrastructure deployment project EGEE and related coordination groups.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114818359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
A credential renewal service for long-running jobs 用于长时间运行的作业的凭据续订服务
The 6th IEEE/ACM International Workshop on Grid Computing, 2005. Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542725
D. Kouril, J. Basney
{"title":"A credential renewal service for long-running jobs","authors":"D. Kouril, J. Basney","doi":"10.1109/GRID.2005.1542725","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542725","url":null,"abstract":"Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived credentials to long-running jobs brings an increased risk that a credential will be compromised and misused. Additionally, it is often difficult to predict the run-time of jobs on the Grid, due to changes in application performance and resource load, making it difficult to set the lifetime of the delegated credential in advance. We have developed a solution to this problem for the EU DataGrid project using the MyProxy online credential repository and have further evolved it during the EGEE project. Users store their long-lived credentials in a dedicated MyProxy server and delegate short-lived credentials to their jobs. When a job's credential nears expiration, the workload management system retrieves a new short-lived credential from the MyProxy server on the user's behalf and uses it to refresh the job's credential. The MyProxy server's policy specifies which services may obtain credentials on the user's behalf, and all operations are logged at the MyProxy server, where access to credentials may be restricted if a compromise is detected or suspected. This system has been used for credential renewal in Grids in Europe for over three years. In this paper, we present the system design, describe our experiences, and discuss the security implications of this approach.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130838864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Auto-adaptive distributed hash tables 自适应分布式哈希表
The 6th IEEE/ACM International Workshop on Grid Computing, 2005. Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542752
A. Dury
{"title":"Auto-adaptive distributed hash tables","authors":"A. Dury","doi":"10.1109/GRID.2005.1542752","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542752","url":null,"abstract":"In this paper we propose a new distributed hash table model called auto-adaptive distributed hash table (AA-DHT). This model uses a distributed profiling of the nodes of the DHT to dynamically adapt the size of the index tables in order to reduce both the message cost and the request latency. This work is an evolution of the architecture for a P2P computing model described by Dury (2004), We detail the auto-adaptive model, the protocols we implemented and tested and we give experimental results of the architecture in simulated networks of up to 640 nodes.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116150847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Grid'5000: a large scale and highly reconfigurable grid experimental testbed Grid’5000:一个大规模和高度可重构的网格实验试验台
The 6th IEEE/ACM International Workshop on Grid Computing, 2005. Pub Date : 2005-11-13 DOI: 10.1109/grid.2005.1542730
F. Cappello, E. Caron, M. Daydé, F. Desprez, Y. Jégou, P. Primet, E. Jeannot, S. Lanteri, J. Leduc, N. Melab, Guillaume Mornet, R. Namyst, Benjamin Quétier, Olivier Richard
{"title":"Grid'5000: a large scale and highly reconfigurable grid experimental testbed","authors":"F. Cappello, E. Caron, M. Daydé, F. Desprez, Y. Jégou, P. Primet, E. Jeannot, S. Lanteri, J. Leduc, N. Melab, Guillaume Mornet, R. Namyst, Benjamin Quétier, Olivier Richard","doi":"10.1109/grid.2005.1542730","DOIUrl":"https://doi.org/10.1109/grid.2005.1542730","url":null,"abstract":"Large scale distributed systems like Grids are difficult to study only from theoretical models and simulators. Most Grids deployed at large scale are production platforms that are inappropriate research tools because of their limited reconfiguration, control and monitoring capabilities. In this paper, we present Grid'5000, a 5000 CPUs nation-wide infrastructure for research in Grid computing. Grid'5000 is designed to provide a scientific tool for computer scientists similar to the large-scale instruments used by physicists, astronomers and biologists. We describe the motivations, design, architecture, configuration examples of Grid'5000 and performance results for the reconfiguration subsystem.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 280
Comparison of end-to-end bandwidth measurement tools on the 10GigE TeraGrid backbone 10GigE TeraGrid骨干网端到端带宽测量工具的比较
The 6th IEEE/ACM International Workshop on Grid Computing, 2005. Pub Date : 2005-11-13 DOI: 10.1109/GRID.2005.1542759
M. Murray, Shava Smallen, Omid Khalili, D. M. Swany
{"title":"Comparison of end-to-end bandwidth measurement tools on the 10GigE TeraGrid backbone","authors":"M. Murray, Shava Smallen, Omid Khalili, D. M. Swany","doi":"10.1109/GRID.2005.1542759","DOIUrl":"https://doi.org/10.1109/GRID.2005.1542759","url":null,"abstract":"Both network managers and grid application users need to maximize the bandwidth utilization of distributed applications in the face of complex interactions between network and system hardware and software along the end-to-end paths. Several software tools exist that attempt to measure end-to-end available bandwidth unobtrusively. Our poster presents results of the first study to compare these tools on a 10GigE network backbone. We use the Inca test harness deployed on the NSF TeraGrid to collect periodic measurements from a fully connected mesh of node pairs on end-to-end paths between eight TeraGrid sites. We compare bandwidth measurements from (1) network weather service (NWS); (2) pathchirp; and (3) pathload. Our poster analyzes collected data to determine tool accuracy and efficiency.","PeriodicalId":347929,"journal":{"name":"The 6th IEEE/ACM International Workshop on Grid Computing, 2005.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126048356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信