Adapting globus and kerberos for a secure ASCI grid.
Patrick C. MooreWilbur R. JohnsonRichard J. DetryPublished in: SC (2001)
Keyphrases
- grid computing
- authentication protocol
- authentication mechanism
- security analysis
- key distribution
- password authentication
- secret key
- mutual authentication
- smart card
- trusted third party
- security requirements
- key management
- authentication scheme
- distributed computing
- security level
- cryptographic protocols
- grid environment
- data encryption
- public key cryptosystem
- load balancing
- user authentication
- security issues
- grid enabled
- grid structure
- lightweight
- security properties
- grid services
- security mechanisms
- software architecture
- neural network
- private key
- identity management
- key exchange
- digital signature
- security protocols
- sensitive data
- privacy protection