Abstract | ||
---|---|---|
Securing a Grid environment presents a distinctive set of challenges. This work groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these activities and introduces new technologies that promise to meet the security requirements of Grids more completely. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1109/JPROC.2004.842776 | Proceedings of the IEEE |
Keywords | Field | DocType |
authorisation,grid computing,message authentication,telecommunication security,access control,authentication,authorization,grid environment security,policy management,secure communication,trust management,computational grid security,security policy,data security,resource management,computer networks,working group,security,computer science,control systems | Data security,Grid computing,Authentication,Computer security,Computer science,Access control,Enforcement,Security policy,Grid,Secure communication | Journal |
Volume | Issue | ISSN |
93 | 3 | 0018-9219 |
Citations | PageRank | References |
34 | 4.49 | 28 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Marty Humphrey | 1 | 1922 | 147.55 |
Mary R. Thompson | 2 | 489 | 66.47 |
Keith R. Jackson | 3 | 481 | 35.62 |