HEAL DSpace

A distributed kerberized access architecture for real time Grids

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Moralis, A en
dc.contributor.author Lenis, A en
dc.contributor.author Grammatikou, M en
dc.contributor.author Papavassiliou, S en
dc.contributor.author Maglaris, B en
dc.date.accessioned 2014-03-01T02:43:49Z
dc.date.available 2014-03-01T02:43:49Z
dc.date.issued 2006 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/31517
dc.relation.uri http://www.scopus.com/inward/record.url?eid=2-s2.0-77954090273&partnerID=40&md5=59293a42c7f442793302ff06c97b2aad en
dc.relation.uri http://www.informatik.uni-trier.de/~ley/db/conf/sis/wosis2006.html#MoralisLGPM06 en
dc.subject Real Time en
dc.subject.other Asymmetric encryption en
dc.subject.other Grid environments en
dc.subject.other Instrument monitoring en
dc.subject.other Kerberos en
dc.subject.other Near-real time en
dc.subject.other Processing overhead en
dc.subject.other Proposed architectures en
dc.subject.other Proxy certificate en
dc.subject.other Public-key infrastructure en
dc.subject.other Real time en
dc.subject.other Running-in en
dc.subject.other Single sign on en
dc.subject.other Symmetric keys en
dc.subject.other Use case scenario en
dc.subject.other Authentication en
dc.subject.other Information systems en
dc.subject.other Public key cryptography en
dc.title A distributed kerberized access architecture for real time Grids en
heal.type conferenceItem en
heal.publicationDate 2006 en
heal.abstract Authentication, authorization and encryption in large scale distributed Grids are usually based on a Public Key Infrastructure (PKI) with asymmetric encryption and X.509 - Proxy certificates for user single sign-on to resources. This approach, however, introduces processing overhead, that may be undesirable in near real time Grid applications (e.g. Grids used for time critical instrument monitoring and control). To alleviate this we introduce in this paper a Symmetric Key - Kerberos based approach that scales in large Grid environments. We present a Use Case Scenario to test and validate the proposed Architecture, in case of numerous time-critical requests running in parallel. en
heal.journalName Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, in Conjunction with ICEIS 2006 en
dc.identifier.spage 23 en
dc.identifier.epage 32 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής