Advertisement

Uniform Authorization Management in ChinaGrid Support Platform

  • Hai Jin
  • Chuanjiang Yi
  • Song Wu
  • Li Qi
  • Deqing Zou
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3759)

Abstract

Users in grid computing environments typically interact with a lot of computing resource, storage resources and I/O devices. Different users are allowed to access different subsets of services, resources. These permissions should be executed correctly to guarantee the security of grid computing.

In ChinaGrid Support Platform (CGSP), there are large numbers of users, services, and resources. To ensure the security of CGSP, we build a user management mechanism to identify every entity, assign different rights based on user role and the properties of services and resources to ensure containers, services and resources in CGSP being used in a right way, and return the results to the correct user. We also consider the access control of files. These are designed in a uniform authorization management mechanism in CGSP.

Keywords

Access Control Access Control Policy Proxy Server Access Privilege Domain Manager 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    CGSP Working Group, Design Specification of ChinaGrid Support Platform. Tsinghua University Press, Beijing (2004)Google Scholar
  2. 2.
  3. 3.
    ChinaGrid Support Platform, http://www.chinagrid.edu.cn/CGSP
  4. 4.
    Deelman, E., Singh, G., Atkinson, M.P., Chervenak, A., Hong, N.P.C., Kesselman, C., Patil, S., Pearlman, L., Su, M.: Grid-Based Metadata Services. In: Proceedings of 16th International Conference on Scientific and Statistical Database Management, SSDBM 2004 (June 2004)Google Scholar
  5. 5.
    Globous Toolkits, http://www.globus.org
  6. 6.
    Jin, H.: ChinaGrid: Making grid computing a reality. In: Chen, Z., Chen, H., Miao, Q., Fu, Y., Fox, E., Lim, E.-p. (eds.) ICADL 2004. LNCS, vol. 3334, pp. 13–24. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Foster, I., Kesselman, C.: Globus: A Metacomputing Infrastructure Toolkit. International J. Supercomputer Application 11(2), 115–128 (1997)CrossRefGoogle Scholar
  8. 8.
    Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organization. International J. Supercomputer Applications 15(3) (2001)Google Scholar
  9. 9.
    Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. In: Open Grid Service Infrastructure WG, Global Grid Forum, June 22 (2002)Google Scholar
  10. 10.
    Internet X.509 Public Key Infrastructure Certificate and CRL Profile, http://www.ietf.org/rfc/rfc2459.txt
  11. 11.
    Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile, http://www.ietf.org/rfc/rfc3820.txt
  12. 12.
    Romberg, M.: The UNICORE Architecture: Seamless Access to Distributed Resources. In: Proceedings of The Eighth IEEE International Symposium on High Performance Distributed Computing, Washington (1999)Google Scholar
  13. 13.
  14. 14.
  15. 15.
    Haubold, S., Mix, H., Nagel, W.E., Romberg, M.: The unicore grid and its options for performance analysis. In: Performance Analysis and Grid Computing, pp. 275–288. Kluwer Academic Publishers, Dordrecht (2004)Google Scholar
  16. 16.
    The TLS Protocol Version 1.0, http://www.ietf.org/rfc/rfc2246.txt
  17. 17.
    Web Service Resource Framework (WSRF), http://www.globus.org/wsrf/

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Hai Jin
    • 1
  • Chuanjiang Yi
    • 1
  • Song Wu
    • 1
  • Li Qi
    • 1
  • Deqing Zou
    • 1
  1. 1.Cluster and Grid Computing Lab.Huazhong University of Science and TechnologyWuhanChina

Personalised recommendations