{"title":"CRO-GRID安全管理系统","authors":"B. Radic, E. Imamagic, D. Dobrenic","doi":"10.1109/ITI.2005.1491100","DOIUrl":null,"url":null,"abstract":"Computer grids are briefly described as highly distributed systems of computer resources which cooperate together towards creating a reliable, scalable dynamically changeable system for providing resources and services to users. Dynamical nature of grid creates additional security challenges. This paper gives an overview of security demands which a grid security system must overcome. First, an explanation of the grid specific security demands is given. Then, an overview of the available grid security systems, first the concepts they use and later technologies that implement those concepts is given. Furthermore, we use these concepts to define our own architecture for enabling security in a grid environment and enhancements to usual grid security mechanisms. We conclude with a description of future steps and how these steps will improve our system.","PeriodicalId":392003,"journal":{"name":"27th International Conference on Information Technology Interfaces, 2005.","volume":"435 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"CRO-GRID security management system\",\"authors\":\"B. Radic, E. Imamagic, D. Dobrenic\",\"doi\":\"10.1109/ITI.2005.1491100\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computer grids are briefly described as highly distributed systems of computer resources which cooperate together towards creating a reliable, scalable dynamically changeable system for providing resources and services to users. Dynamical nature of grid creates additional security challenges. This paper gives an overview of security demands which a grid security system must overcome. First, an explanation of the grid specific security demands is given. Then, an overview of the available grid security systems, first the concepts they use and later technologies that implement those concepts is given. Furthermore, we use these concepts to define our own architecture for enabling security in a grid environment and enhancements to usual grid security mechanisms. We conclude with a description of future steps and how these steps will improve our system.\",\"PeriodicalId\":392003,\"journal\":{\"name\":\"27th International Conference on Information Technology Interfaces, 2005.\",\"volume\":\"435 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"27th International Conference on Information Technology Interfaces, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITI.2005.1491100\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"27th International Conference on Information Technology Interfaces, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITI.2005.1491100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Computer grids are briefly described as highly distributed systems of computer resources which cooperate together towards creating a reliable, scalable dynamically changeable system for providing resources and services to users. Dynamical nature of grid creates additional security challenges. This paper gives an overview of security demands which a grid security system must overcome. First, an explanation of the grid specific security demands is given. Then, an overview of the available grid security systems, first the concepts they use and later technologies that implement those concepts is given. Furthermore, we use these concepts to define our own architecture for enabling security in a grid environment and enhancements to usual grid security mechanisms. We conclude with a description of future steps and how these steps will improve our system.