A security architecture for computational grids

Author(s):  
Ian Foster ◽  
Carl Kesselman ◽  
Gene Tsudik ◽  
Steven Tuecke
Author(s):  
Massimiliano Pala ◽  
Shreyas Cholia ◽  
Scott A. Rea ◽  
Sean W. Smith

One of the most successful working examples of virtual organizations, computational Grids need authentication mechanisms that inter-operate across domain boundaries. Public Key Infrastructures (PKIs) provide sufficient flexibility to allow resource managers to securely grant access to their systems in such distributed environments. However, as PKIs grow and services are added to enhance both security and usability, users and applications must struggle to discover available resources-particularly when the Certification Authority (CA) is alien to the relying party. This chapter presents a successful story about how to overcome these limitations by deploying the PKI Resource Query Protocol (PRQP) into the grid security architecture. We also discuss the future of Grid authentication by introducing the Public Key System (PKS) and its key features to support federated identities.


1993 ◽  
Author(s):  
KELLY PARMLEY ◽  
JOHN DANNENHOFFER, III ◽  
NIGEL WEATHERILL

2020 ◽  
Vol 22 (Summer 2020) ◽  
pp. 75-86
Author(s):  
Haris Bilal Malik ◽  
Muhammad Abbas Hassan

The longstanding unresolved issue of Kashmir serves as a nuclear flashpoint between India and Pakistan. Since 2019, the prevalent security environment of the region has dominated the discourse surrounding the regional and global security architecture. India’s policies during the Pulwama-Balakot crisis and the revocation of Kashmir’s constitutional status demonstrate the country’s intentions of dominating the escalation ladder in the region and marginalizing the muslim community of Kashmir. Because of the conventional disparity in South Asia where India is big interms of size, economy and military build-up, Pakistan has been further threatened by India’s aggressive policies and provocative military modernization. Consequently, Pakistan may be compelled to further revisit its nuclear threshold level to overcome India’s aggression.


2014 ◽  
Vol 36 (9) ◽  
pp. 1765-1784 ◽  
Author(s):  
Chuang LIN ◽  
Wen-Bo SU ◽  
Kun MENG ◽  
Qu LIU ◽  
Wei-Dong LIU

Sign in / Sign up

Export Citation Format

Share Document