Advertisement

VO Authentication Framework in Grid Environment Using Digital Signature

  • Seoung-Hyeon Lee
  • Byung-Sun Choi
  • Jae-Seung Lee
  • Ki-Young Moon
  • Jae-Kwang Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3981)

Abstract

We suggest authentication scheme of resource group and protection scheme of RSL or resource information in Grid environment based on web services. At present, resource group composed of job request in Grid middleware has no scheme of itself to be authenticated what it is a set of legal resources. Because of using SSL, it also breaks out heavy overload on each process as the aspects of protection for RSL or resource information towards and away between each resource groups and users. In particular, implementation of Grid service based on web services works out no plan on an above essential point. This paper provides the efficient protection scheme of RSL or resource information transmitted through network and authentication scheme of resource group in web-service based Grid environment with relating XML-Signature and resource management system.

Keywords

Resource Information Security Policy Authentication Scheme Grid Resource Grid Environment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    GGF, Open Grid Service Infrastructure0, Draft 1 (June 2003)Google Scholar
  2. 2.
    GGF, The Security Architecture for Open Grid Services, Draft 1 (July 2002)Google Scholar
  3. 3.
    GGF, OGSA Security Roadmap, Draft 1.3 (July 2002)Google Scholar
  4. 4.
    GGF, Grid Security Infrastructure Roadmap, draft (July 2002)Google Scholar
  5. 5.
    GGF Security Working Group, http://www.ggf.org/security/gsi/
  6. 6.
    Buyya, R., Chapin, S., Nucci, D.D.: Architectureal Models for Resource Management in the Grid. In: Buyya, R., Baker, M. (eds.) GRID 2000. LNCS, vol. 1971, pp. 18–35. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  7. 7.
  8. 8.
    Grid Security Infrastructure, http://www.globus.org/Security
  9. 9.
    GGF, CA-based Trust Issues for Grid Authentication and Identity Delegation, Draft 1 (June 2003)Google Scholar
  10. 10.
    GGF, Global Grid Forum Certificate Policy Model, w.g (June 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Seoung-Hyeon Lee
    • 1
  • Byung-Sun Choi
    • 2
  • Jae-Seung Lee
    • 1
  • Ki-Young Moon
    • 1
  • Jae-Kwang Lee
    • 2
  1. 1.Biometrics Technology Research TeamETRIDaejeonKorea
  2. 2.Dept. of Computer EngineeringHannam UniversityDaejeonKorea

Personalised recommendations