Font Size: a A A

The Design And Implementation Of The User Management System In CMAG

Posted on:2004-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:K J RenFull Text:PDF
GTID:2168360152457049Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
CMAG(China Meteorological Application Grid) is supported by the High Performance Computing and Core Software, which is one of the major projects under 863 Program. The main purpose of project CMAG is to create R&D environment of weather forecast by grid technology, and to share high performance computing resource, meteorological observed data and software resource inside Weather Bureau. The User Management System of CMAG is the important part of meteorological application grid, and its goal is to build uniform .management platform for all the meteorological grid users.Based on the requests of The User Management System of CMAG, this essay first reviews the basic knowledge of grid security, such as PKI, SSL, etc, and then discusses the security requirements and targets of grid environment, security identification methods, security entrust, single sign-on, GSI common service programming interface, software hierarchical structure, flow control (i.e. register, proxy, login, information, grid administrator, management flow, etc), security database, access control model and model function definition, etc. According to designing scheme, we get the prototype of the User Management System of CMAG.The User Management System discussed in this essay is based on grid security GSI and security proxy technology, and by adopting the joining of global management and local management , we get the function of single sign-on for our users. We also accomplish two-layers access control technology. By adopting grid portal technology, we accomplish the first layer access control. While for the second layer, we accomplish by joining access tactics in Globus and the local security tactics for every grid service node.
Keywords/Search Tags:PKI, SSL, GSI, Grid Portal, MyProxy, User Management
PDF Full Text Request
Related items