This paper presents an analysis of a solution proposed to guarantee the security of a grid application monitoring system - the OCM-G. Two aspects of security are distinguished: inter-component communication and forge-component attack. The solution is based on methods of the Grid Security Infrastructure. We show that even authentication, encryption and integrity via digital signatures are not enough to achieve a desired security level. In our system, a special protocol of extending of the logical structures in the OCM-G, so called Virtual Monitoring Systems, was needed in addition to the standard security mechanisms. © Springer-Verlag Berlin Heidelberg 2004.
CITATION STYLE
Baliś, B., Bubak, M., Rza̧sa, W., Szepieniec, T., & Wismüller, R. (2004). Security in the OCM-G grid application monitoring system. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3019, 779–787. https://doi.org/10.1007/978-3-540-24669-5_102
Mendeley helps you to discover research relevant for your work.