Abstract
In recent years, numerous projects focusing on utilization of geographically-distributed environments have called upon certificates and certificate authorities for authentication, for validation, and for assigning access privileges to groups. This paper describes a prototype established for utilizing certificates in the IceT environment for facilitating merging of resource groups. This prototype extends this paradigm to leverage significantly upon certificate revocation lists to permit predictable, dynamic splittings of groups.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Butler, R., Engert, D., Foster, I., Kesselman, C., Tuecke, S., Volmer, J., and Welch, V. Design and deployment of a national-scale authentication infrastructure. IEEE Computer, 12 (2000), 60–66.
Diffie, W., and Hellman, M. New directions in cryptography. IEEE Transactions on Information Theory IT, 22 (Nov. 1976), 644–654.
Dunigan, T.H., and Venugopal, N. Secure PVM. Tech. Rep. TM-13203, Oak Ridge National Laboratories, Aug. 1996.
Foster, I., and Kesselman, C. Globus: A Metacomputing Infrastructure Toolkit. International Journal of Supercomputing Applications (May 1997).
Foster, I., and Kesselman, C. The Grid, Blueprint for a new computing infrastructure. Morgan Kaufmann Publishers, Inc., 1998.
Freier, A.O., Karlton, P., and Kocher, P.C. The SSL Protocol, version 3.0. Netscape Communications, Internet Draft. Available on-line at http://www.netscape.com/eng/ssl3/, Nov. 1996.
Getov, V., Gray, P., and Sunderam, V. MPI and Java-MPI: Contrasts and comparisons of low-level commnication performance. In Proceedings of Supercomputing 99 (Nov. 1999).
Getov, V., Gray, P., and Sunderam, V. Aspects of portability and distributed execution for JNI-wrapped code. Concurrency: Practice and Experience 20, 11(200), 1039–1050. ISSN 1040-3108.
Gray, P., Sunderam, V., Geist, A., and Scott, S. Bringing cross-cluster functionality to processes through the merging and splitting of virtual environments. Submitted to JavaGrande/ISCOPE-2001 conference, Jan. 2001.
Grimshaw, A., Wulf, W., and French, J. Legion: The Next Logical Step Toward a Nationwide Virtual Computer. Tech. rep., University of Virginia, 1994. T-R Number CS-94-21.
Ingemarsson, I., Tang, D., and Wong, C. A Conference Key Distribution System. IEEE Transactions on Information Theory 28, 5 (Sept. 1982), 714–720.
International Telecommunication Union. X.509: Information technology-open systems interconnection-the directory: Public-key and attribute certificate frameworks, Mar. 2000. ITU-T Recommendation. To be published.
Kaufman, C., Perlman, R., and Speciner, M. Network Security: Private communication in a public world. Prentice Hall, Upper Saddle River, New Jersey 07458, 1995.
Sheng Liang. The Java Native Method Interface: Programming Guide and Reference. Addison-Wesley, 1998.
Thompson, M., Johnston, W., Mudambai, S., Hoo, G., Jackson, K., and Essiari, A. Certificate-based access control for widely distributed resources. In Proceedings of the Eighth Usenix Security Symposium (Aug. 1999).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gray, P.A., Sunderam, V.S. (2001). Certificate Use for Supporting Merging and Splitting of Computational Environments⋆. In: Hertzberger, B., Hoekstra, A., Williams, R. (eds) High-Performance Computing and Networking. HPCN-Europe 2001. Lecture Notes in Computer Science, vol 2110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48228-8_15
Download citation
DOI: https://doi.org/10.1007/3-540-48228-8_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42293-8
Online ISBN: 978-3-540-48228-4
eBook Packages: Springer Book Archive