Security in the OCM-G grid application monitoring system

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents an analysis of a solution proposed to guarantee the security of a grid application monitoring system - the OCM-G. Two aspects of security are distinguished: inter-component communication and forge-component attack. The solution is based on methods of the Grid Security Infrastructure. We show that even authentication, encryption and integrity via digital signatures are not enough to achieve a desired security level. In our system, a special protocol of extending of the logical structures in the OCM-G, so called Virtual Monitoring Systems, was needed in addition to the standard security mechanisms. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Baliś, B., Bubak, M., Rza̧sa, W., Szepieniec, T., & Wismüller, R. (2004). Security in the OCM-G grid application monitoring system. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3019, 779–787. https://doi.org/10.1007/978-3-540-24669-5_102

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free