2005
DOI: 10.1016/j.ijhcs.2005.04.017
|View full text |Cite
|
Sign up to set email alerts
|

Mechanisms for increasing the usability of grid security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
34
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 31 publications
(36 citation statements)
references
References 17 publications
1
34
0
Order By: Relevance
“…UserID (credential delegation occurs here), in the credential repository. ACD sends the randomly generated username/password pair needed to access MyProxy to the AHE server to download the session proxy (8) and (9). Finally, the AHE server sends the request to the grid resource site along with the proxy.…”
Section: Ahe With Acd: Usable and Secure Access To Grid Resourcesmentioning
confidence: 99%
See 2 more Smart Citations
“…UserID (credential delegation occurs here), in the credential repository. ACD sends the randomly generated username/password pair needed to access MyProxy to the AHE server to download the session proxy (8) and (9). Finally, the AHE server sends the request to the grid resource site along with the proxy.…”
Section: Ahe With Acd: Usable and Secure Access To Grid Resourcesmentioning
confidence: 99%
“…This is not the case in any other established grid environment. We have integrated our work with an environment which allows the user to actually run applications on the grid (namely the AHE); ACD is not simply a security layer, as in MyProxy, Kerberos, Active Directory, Shibboleth or Fermilab's security mechanisms [9]. These security components only address authentication issues whereas ACD addresses authorization and accountability as well.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the UK National Grid Service, 1 for example, obtaining a public key certificate requires the generation of a key pair using a web browser, transmission of the public component to a CA for certification, and a face-to-face meeting with a Registration Authority (RA) to prove user identity and membership in a grid project and to provide justification for grid usage. Studies have shown that users tend to share credentials within their peer groups because of the cumbersome and time-consuming process of credential acquisition (which may take up to few weeks) [6,7]. Clearly, this increases the risk of private key exposure.…”
Section: Motivationsmentioning
confidence: 99%
“…These are roughly equivalent to verifying the validity period and enforcing policy stated in a proxy certificate in the GSI. 7 It might be thought that the need for the secure channel to transport the proxy private key fromĀ toX is a limitation of this approach. In fact, the secure channel between these two parties will exist anyway; the parties have to authenticate each other using an authenticated key agreement protocol, before the delegation can take place.…”
Section: Delegationmentioning
confidence: 99%