Font Size: a A A

Research On Grid Authentication And Authorization Based On GLOBUS

Posted on:2007-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:X L WangFull Text:PDF
GTID:2178360212968008Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Grid computing system is to organize the geographic distribution, system isomerism, diversified resources with various functions including super computer, large-scale storing system, personal computer and diversified equipments under a uniform frame and to connect them by the high speed internet, thus, to form a wild gapless integration and cooperating computing surroundings. Grid system just like providing a virtual super computer with super capacity, this will give very strong impact to the development of society and economy, also to people's life. Despite the prosperous future, the research of grid technology is still at its beginning, there are many critical technical problems need to be solved, among them, the security of grid system is all-important.Due to the open isomerism condition of grid, large quantity of the users and huge quantity of data, the grid computing system faces to the various threat such as data hijacking, vicious information modification and canceling and counterfeited user and server. Therefore, to study the new features of network security and to solve the problems of network security are critical for grid technology development.Authentication and authorization are the core technology of grid security and have the important function for the safe grid communication. Comparing with the traditional network, grid condition has higher level of demand to the expansibility and flexibility of system; it also brings the new challenges to authentication and authorization technology.This paper introduces the concept, system structure and current research situation of grid technology at beginning, and explains the important function of authentication and authorization for grid security, expound the current research situation of grid authentication technology; then, the paper introduces the key technology, requirement and security strategy of grid security, and introduces particularly the of famous fruit of grid computing, Globus security system structure GSI and GT4 and GSI security...
Keywords/Search Tags:Grid security, GSI, Authentication, Authorization, Virtual Organization
PDF Full Text Request
Related items