Abstract
In distributed computing environments information is stored in different locations using different technical systems. Challenging is to allow easy access to heterogeneous resources without an uniform user management and to combine data from different resources for further processing. To delegate the user requests the according login data for different resources have to be present in a central location. The management of these highly sensible data comprises miscellaneous security aspects, e.g. to develop methods to store login data in a secure way. In this paper a security concept to deal with sensitive login data in a central component is presented. This includes a collaboration with the operators of the distributed resources and is discussed in the context of the knowledge infrastructure WisNetGrid.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
WisNetGrid: Networks of Knowledge in the Grid, http://wisnetgrid.org/
Jensen, J., Spence, D., Viljoen, M.: Grid single sign-on in CCLRC. In: To appear in the Proceedings of the 2006 UK e-Science All Hands Meeting (2006)
Lee, A.J., Winslett, M., et al.: Traust: A Trust Negotiation-Based Authorization Service for Open Systems. In: SACMAT 2006: Proceedings Of The Eleventh ACM Symposium On Access, pp. 39–48. ACM Press, New York (2006)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control (2001)
GWES: The Generic Workflow Execution Service, http://www.gridworkflow.org/kwfgrid/gwes-web/
Deutsche Grid-Initiative: The German grid initiative, http://www.dgrid.de/
de Riese, M., Fuhrmann, P., Mkrtchyan, T., Ernst, M., Kulyavtsev, A., Podstavkov, V., Radicke, M., Sharma, N., Litvintsev, D., Perelmutov, T., Hesselroth, T.: The dCacheBook for versions prior to 1.9.7-1. dCache.org (2010), http://www.dcache.org/manuals/Book-1.9.5/
Rajasekar, A., Moore, R., Hou, C.Y., Lee, C.A., Marciano, R., de Torcy, A., Wan, M., Schroeder, W., Chen, S.Y., Gilbert, L., Tooby, P., Zhu, B.: iRODS Primer: integrated Rule-Oriented Data System. Morgan & Claypool (2010); ISBN: 1608453332
MySQL: The world’s most popular open source database, http://dev.mysql.com/
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography (Discrete Mathematics and Its Applications). CRC Press (2001); ISBN: 0-8493-8523-7
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hilbrich, M., Hünich, D., Jäkel, R. (2011). A Security Approach for Credential-Management in Distributed Heterogeneous Systems. In: Brazier, F.M.T., Nieuwenhuis, K., Pavlin, G., Warnier, M., Badica, C. (eds) Intelligent Distributed Computing V. Studies in Computational Intelligence, vol 382. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24013-3_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-24013-3_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24012-6
Online ISBN: 978-3-642-24013-3
eBook Packages: EngineeringEngineering (R0)