Skip to main content

A Methodology for Account Management in Grid Computing Environments

  • Conference paper
  • First Online:
Grid Computing — GRID 2001 (GRID 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2242))

Included in the following conference series:

Abstract

A national infrastructure of Grid computing environments will provide access for a large pool of users to a large number of distributed computing resources. Providing access for the complete pool of potential users would put an unacceptably large administrative burden on sites that participate in the Grid. Current approaches to solve this problem require an account for each user at a site, or maps all users into one account. This paper proposes an alternative approach to account allocation that provides the benefits of persistent accounts while minimizing the administrative burden on Grid resource providers. A technique for calculating the upper bound on the number of jobs and users offered to the system from the Grid that is based on historical use is presented. Finally, application of this approach to the National Institutes of Health Visible Human Project is described.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. I. Foster, C. Kesselman (editors), The Grid: Blueprint for a New Computing Infrastructure, Morgan Kauffman Publishers, 1999.

    Google Scholar 

  2. R. Housley, W. Ford, W. Polk, D. RFC 2459 “Internet X.509 Public Key Infrastructure Certificate and CRL Profile”, January 1999.

    Google Scholar 

  3. D. H. J Epema, M. Livny, R. van Dantzig, X. Evers, and J. Pruyne, “A Worldwide Flock of Condors: Load Sharing among Workstation Clusters”, Journal on Future Generations of Computer Systems Volume 12, 1996.

    Google Scholar 

  4. N. Kapadia and J. Fortes, “PUNCH: An Architecture for Web-Enabled Wide-Area Network-Computing”, Cluster Computing: The Journal of Networks, Software Tools and Applications, September 1999.

    Google Scholar 

  5. B. Doster, J. Rees, “Third-Party “Authentication for the Institutional File System”, University of Michigan CITI Technical Report 92-1.

    Google Scholar 

  6. I. Foster, C. Kesselman, C, “Globus: A Metacomputing Infrastructure Toolkit”, International Journal of Supercomputing Applications, 11(2): 115–128, 1997.

    Google Scholar 

  7. T. Hacker, W. Thigpen, “Distributed Accounting on the Grid”, Grid Forum Working Draft.

    Google Scholar 

  8. R. Buyya, D. Abramson, J. Giddy, “An Economy Grid Architecture for Service-Oriented Grid Computing”, 10th IEEE International Heterogeneous Computing Workshop,April 2001.

    Google Scholar 

  9. R. Wolff, Stochastic Modeling and the Theory of Queues. Prentice Hall, 1989.

    Google Scholar 

  10. V. Paxson, S. Floyd, “Wide-area Traffic: The Failure of Poisson Modeling”, IEEE/ACM Transactions on Networking, pp.226–244, June 1995.

    Google Scholar 

  11. 3 Point Technologies, Inc. Qsim Modeling Functions for Excel.

    Google Scholar 

  12. S. Qiao, L. Qiao, “A Robust and Efficient Algorithm for Evaluating Erlang B Formula”, TR CAS98-03, Department of Computing and Software, McMaster University, 1998.

    Google Scholar 

  13. J. Green, The Irwin Handbook of Telecommunications Management. Irwin Professional Publishing, 1996.

    Google Scholar 

  14. Intel Support Document #8150:A Traffic Engineering Model for LAN Video Conferencing.

    Google Scholar 

  15. M. Thompson, W. Johnston, S. Mudumbai, G. Hoo, K. Jackson, Essiari, “A. Certificate-based Access Control for Widely Distributed Resource”,. Proceedings of the Eighth Usenix Security Symposium, Aug.’ 1999.

    Google Scholar 

  16. M. J. Ackerman, “The Visible Human Project,” J. Biocomm., vol. 18, p 14, 1991.

    Google Scholar 

  17. I. Foster, C. Kesselman, S. Tuecke, “The Anatomy of the Grid: Enabling Scalable Virtual Organizations.” (to be published in Intl. J. Supercomputer Applications, 2001).

    Google Scholar 

  18. R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, V. Welch. “A National-Scale Authentication Infrastructure.” IEEE Computer, 33(12):60–66, 2000.

    Article  Google Scholar 

  19. M. Blaze, J. Feigenbaum, A. Keromytis. “KeyNote Trust-Management System”, RFC 2704

    Google Scholar 

  20. W. Doster, M. Watts, D. Hyde. “The KX.509 Protocol”, CITI Technical Report 012, February 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hacker, T.J., Athey, B.D. (2001). A Methodology for Account Management in Grid Computing Environments. In: Lee, C.A. (eds) Grid Computing — GRID 2001. GRID 2001. Lecture Notes in Computer Science, vol 2242. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45644-9_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-45644-9_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42949-4

  • Online ISBN: 978-3-540-45644-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics