Skip to main content

XML Based X.509 Authorization in CERNET Grid

  • Conference paper
  • 230 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3251))

Abstract

This paper presents an authorization solution for resource management and control developed as part of the China Education and Research Network (CERNET) to perform fine-grained authorization of job and resource management requests in a Grid environment which meets the Fusion-Grid’s security needs in large scale networks such as CERNET. It integrates the GT2 job manager and X.509 authorization and this model can be extended to other authorization decision functions. It allows the system to evaluate a user’s resource specification language request against authorization policies on resource usage. Furthermore, based on XML integrated authorization policies, it allows other virtual organization members to manage the user’s resources.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ferrari, J., Knabe, F., Humphrey, M.A., et al.: A Flexible Security System for Metacomputing Environments. In: High Performance Computing and Networking Europe, HPNC Europe 1999 (1999)

    Google Scholar 

  2. Czajkowski, K., Foster, I., Karonis, N., et al.: A Resource Management Architecture for Metacomputing Systems. In: 4th Workshop on Job Scheduling Strategies for Parallel Processing, pp. 62–82. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. http://www.cernet.edu.cn

  4. The Global Grid Forum, www.ggf.org (May 2003), http://www.globus.org/ogsa/eleases/alpha/index.html

  5. Alfieri, R., Cecchini, R., Ciaschini, V., et al.: VOMS, an Authorization System for Virtual Organizations. In: 1st European Across Grids Conference, Santiago de Compostela, February 13-14 (2003)

    Google Scholar 

  6. Keahey, K., Welch, V.: Fine-Grain Authorization for Resource Management in the Grid Environment. In: Parashar, M. (ed.) GRID 2002. LNCS, vol. 2536, pp. 199–206. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Thompson, M., Essiari, A., Mudumbai, S.: Certificate-based Authorization Policy in a PKI Environment. ACM Transactions on Information and System Security (August 2003)

    Google Scholar 

  8. Tuecke, S., Engert, D., Foster, I., et al.: Internet X.509 Public Key Infrastructure Proxy Certificate Profile, IETF (2003)

    Google Scholar 

  9. Dierks, T., Rescorla, E.: The TLS protocol, IETF RFC 2246 (January 1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, W., Wu, JP., Duan, HX., Li, X., Ren, P. (2004). XML Based X.509 Authorization in CERNET Grid. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds) Grid and Cooperative Computing - GCC 2004. GCC 2004. Lecture Notes in Computer Science, vol 3251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30208-7_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30208-7_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23564-4

  • Online ISBN: 978-3-540-30208-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics