Abstract
This paper presents an authorization solution for resource management and control developed as part of the China Education and Research Network (CERNET) to perform fine-grained authorization of job and resource management requests in a Grid environment which meets the Fusion-Grid’s security needs in large scale networks such as CERNET. It integrates the GT2 job manager and X.509 authorization and this model can be extended to other authorization decision functions. It allows the system to evaluate a user’s resource specification language request against authorization policies on resource usage. Furthermore, based on XML integrated authorization policies, it allows other virtual organization members to manage the user’s resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ferrari, J., Knabe, F., Humphrey, M.A., et al.: A Flexible Security System for Metacomputing Environments. In: High Performance Computing and Networking Europe, HPNC Europe 1999 (1999)
Czajkowski, K., Foster, I., Karonis, N., et al.: A Resource Management Architecture for Metacomputing Systems. In: 4th Workshop on Job Scheduling Strategies for Parallel Processing, pp. 62–82. Springer, Heidelberg (1998)
The Global Grid Forum, www.ggf.org (May 2003), http://www.globus.org/ogsa/eleases/alpha/index.html
Alfieri, R., Cecchini, R., Ciaschini, V., et al.: VOMS, an Authorization System for Virtual Organizations. In: 1st European Across Grids Conference, Santiago de Compostela, February 13-14 (2003)
Keahey, K., Welch, V.: Fine-Grain Authorization for Resource Management in the Grid Environment. In: Parashar, M. (ed.) GRID 2002. LNCS, vol. 2536, pp. 199–206. Springer, Heidelberg (2002)
Thompson, M., Essiari, A., Mudumbai, S.: Certificate-based Authorization Policy in a PKI Environment. ACM Transactions on Information and System Security (August 2003)
Tuecke, S., Engert, D., Foster, I., et al.: Internet X.509 Public Key Infrastructure Proxy Certificate Profile, IETF (2003)
Dierks, T., Rescorla, E.: The TLS protocol, IETF RFC 2246 (January 1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, W., Wu, JP., Duan, HX., Li, X., Ren, P. (2004). XML Based X.509 Authorization in CERNET Grid. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds) Grid and Cooperative Computing - GCC 2004. GCC 2004. Lecture Notes in Computer Science, vol 3251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30208-7_47
Download citation
DOI: https://doi.org/10.1007/978-3-540-30208-7_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23564-4
Online ISBN: 978-3-540-30208-7
eBook Packages: Springer Book Archive