4. مقدمه
Sharing of resources using the grid
Anirban Chakrabarti, Grid Computing Security, ISBN 978-3-540-44492-3 Springer Berlin Heidelberg New York , Fig 1.2
The layered Grid architecture and hourglass model.
http://www.sciencedirect.com/science/article/pii/S0957417409001936#
معماریگرید
9. گرید شبکه در امنیت
Taxonomy of grid security issues
Anirban Chakrabarti, Grid Computing Security, ISBN 978-3-540-44492-3 Springer Berlin Heidelberg New York , Fig 3.1
gLite Architecture
http://www.risc.jku.at/projects/egee2/NA3/glite/html/index_4.html
10. گرید شبکه در امنیت
Information
Sec
Secure
Common
Authentication
SSO &
Delegation
Authorization
VO Level
Resource Level
Service
DOS
QOS violation
Architectures Issues
11. گرید شبکه در امنیت
Host
Data
Protection
Job
Starvation
Network
Access
Control
Routing
Sensor Grid
Multicasting
High Perf.
Infrastructure Issues
17. امنیتی های چالش برای حلی راه
احرازهویتبرپایهX.509زیرساختPKI
وکالت(Proxy)
Authentication
Request
Auth
DB
C=GCG=IPM
/L=Iran-Grid
/CN=Mohammad Reza
Gerami
VOMS
AC
VOMS
AC
21. منابع
Foster, I., Kesselman, C. and Tuecke, S. The Anatomy of the Grid: Enabling
Scalable Virtual Organizations. International Journal of High
Performance Computing Applications, 15 (3). 200-222. 2001.
Butler, R., Engert, D., Foster, I., Kesselman, C., Tuecke, S., Volmer, J. and
Welch, V. A National-Scale Authentication Infrastructure. IEEE
Computer, 33 (12). 60-66. 2000.
Foster, I., Kesselman, C., Tsudik, G. and Tuecke, S. A Security Architecture for
Computational Grids. ACM Conference on Computers and Security, 1998,
83-91.
Tuecke, S., Engert, D., Foster, I., Thompson, M., Pearlman, L. and Kesselman,
C. Internet X.509 Public Key Infrastructure Proxy Certificate Profile,
IETF, 2001
I. Foster, J. Frey, S. Graham, S. Tuecke, K. Czajkowski, D. Ferguson,
F.Leymann, M. Nally, I. Sedukhin, D. Snelling, T. Storey, W. Vambenepe,
S.Weerawarana. Modeling Stateful Resources with Web Services. IB M®
Developer Works, 2004, accessed on 13th July, 2006.