dc.contributor.author |
Moralis, A |
en |
dc.contributor.author |
Lenis, A |
en |
dc.contributor.author |
Grammatikou, M |
en |
dc.contributor.author |
Papavassiliou, S |
en |
dc.contributor.author |
Maglaris, B |
en |
dc.date.accessioned |
2014-03-01T02:43:49Z |
|
dc.date.available |
2014-03-01T02:43:49Z |
|
dc.date.issued |
2006 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/31517 |
|
dc.relation.uri |
http://www.scopus.com/inward/record.url?eid=2-s2.0-77954090273&partnerID=40&md5=59293a42c7f442793302ff06c97b2aad |
en |
dc.relation.uri |
http://www.informatik.uni-trier.de/~ley/db/conf/sis/wosis2006.html#MoralisLGPM06 |
en |
dc.subject |
Real Time |
en |
dc.subject.other |
Asymmetric encryption |
en |
dc.subject.other |
Grid environments |
en |
dc.subject.other |
Instrument monitoring |
en |
dc.subject.other |
Kerberos |
en |
dc.subject.other |
Near-real time |
en |
dc.subject.other |
Processing overhead |
en |
dc.subject.other |
Proposed architectures |
en |
dc.subject.other |
Proxy certificate |
en |
dc.subject.other |
Public-key infrastructure |
en |
dc.subject.other |
Real time |
en |
dc.subject.other |
Running-in |
en |
dc.subject.other |
Single sign on |
en |
dc.subject.other |
Symmetric keys |
en |
dc.subject.other |
Use case scenario |
en |
dc.subject.other |
Authentication |
en |
dc.subject.other |
Information systems |
en |
dc.subject.other |
Public key cryptography |
en |
dc.title |
A distributed kerberized access architecture for real time Grids |
en |
heal.type |
conferenceItem |
en |
heal.publicationDate |
2006 |
en |
heal.abstract |
Authentication, authorization and encryption in large scale distributed Grids are usually based on a Public Key Infrastructure (PKI) with asymmetric encryption and X.509 - Proxy certificates for user single sign-on to resources. This approach, however, introduces processing overhead, that may be undesirable in near real time Grid applications (e.g. Grids used for time critical instrument monitoring and control). To alleviate this we introduce in this paper a Symmetric Key - Kerberos based approach that scales in large Grid environments. We present a Use Case Scenario to test and validate the proposed Architecture, in case of numerous time-critical requests running in parallel. |
en |
heal.journalName |
Proceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, in Conjunction with ICEIS 2006 |
en |
dc.identifier.spage |
23 |
en |
dc.identifier.epage |
32 |
en |