Humphrey et al., 2005 - Google Patents
Security for gridsHumphrey et al., 2005
View PDF- Document ID
- 5928265211403585124
- Author
- Humphrey M
- Thompson M
- Jackson K
- Publication year
- Publication venue
- Proceedings of the IEEE
External Links
Snippet
Securing a Grid environment presents a distinctive set of challenges. This work groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It …
- 238000004891 communication 0 abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Humphrey et al. | Security for grids | |
| Chakrabarti | Grid computing security | |
| David et al. | Cloud Security Service for Identifying Unauthorized User Behaviour. | |
| US20010020228A1 (en) | Umethod, system and program for managing relationships among entities to exchange encryption keys for use in providing access and authorization to resources | |
| US20090287933A1 (en) | System and method that uses cryptographic certificates to define groups of entities | |
| US20080263644A1 (en) | Federated authorization for distributed computing | |
| Clarke | SPKI/SDSI HTTP server/certificate chain discovery in SPKI/SDSI | |
| Zhang | Integrated security framework for secure web services | |
| Spies | Public key infrastructure | |
| Fang et al. | XPOLA–An Extensible Capability-based Authorization Infrastructure for Grids | |
| Phan | Service oriented architecture (soa)-security challenges and mitigation strategies | |
| Green et al. | Grid-enabled virtual organization based dynamic firewall | |
| Muftic et al. | Security architecture for distributed systems | |
| Perrin et al. | Delegated cryptography, online trusted third parties, and PKI | |
| Lock et al. | Grid Security and its use of X. 509 Certificates | |
| Goodrich et al. | Notarized federated ID management and authentication | |
| CN114996770B (en) | Identity recognition method based on sink management system | |
| Oo et al. | Access control system for grid security infrastructure | |
| Goodrich et al. | Notarized federated identity management for web services | |
| Haidar et al. | Critical evaluation of current approaches to grid security | |
| Dhampiban-udom et al. | BZET-IAM: Enabling Blockchain-Based Zero Trust SSO for Dynamic Identity and Access Management | |
| Wang et al. | Reducing the Dependence of SPKI/SDSI on PKI | |
| JP5466698B2 (en) | Systems that process encryption certificates | |
| WO2025163753A1 (en) | Terminal, communication system, communication method, and program | |
| Saito et al. | A privacy‐enhanced access control |