Information Technology Reference
In-Depth Information
12
Grid Security
Richard O. Sinnott
CONTENTS
12.1 Introduction ................................................................................. 308
12.2 Authentication and Grid Systems ............................................. 309
12.2.1 Public Key Infrastructure ............................................... 310
12.2.2 Problems with PKIs ......................................................... 311
12.3 Authorization and Grid Systems .............................................. 312
12.3.1 Globus Security Infrastructure ..................................... 313
12.3.2 Community Authorization Service .............................. 314
12.3.3 Virtual Organization Membership
Service ............................................................................... 315
12.3.4 Privilege and Role Management Infrastructure
Standards Validation ....................................................... 316
12.4 Shibboleth and Grid Security .................................................... 318
12.5 Case Studies in User-Oriented Grid Security ......................... 322
12.5.1 VOTES Project .................................................................. 323
12.5.2 GEMEPS Project ............................................................... 326
12.5.3 BRIDGES Project .............................................................. 328
12.6 Conclusions and Recommendations ........................................ 329
References ............................................................................................. 331
307
 
 
Search WWH ::




Custom Search