DocumentCode :
584886
Title :
Authentication mechanisms in grid computing environment: Comparative study
Author :
Farouk, Amr ; Abdelhafez, Ahmed A. ; Fouad, Mohamed M.
Author_Institution :
Department of Computer Engineering, Military Technical College, Cairo, Egypt
fYear :
2012
fDate :
10-11 Oct. 2012
Firstpage :
1
Lastpage :
6
Abstract :
For the reason that grid resources are valuable, access is usually limited, based on the requested resource and the requesting user´s identity. Authentication in distributed systems like grid computing environment is the first defense line before other security aspects; authorization, confidentiality, integrity and auditing. The main grid authentication mechanisms challenges are single sign-on, secure credential repositories, and cross-domain authentication. This paper presents a comparative study of various authentication mechanisms in grid computing environment to investigate their pros and cons. Such analysis is particularly relevant for those seeking an intensive assessment to appropriate grid authentication mechanisms.
Keywords :
authorisation; data integrity; grid computing; auditing; authentication mechanisms; authorization; confidentiality; cross-domain authentication; grid computing environment; grid resources; integrity; secure credential repositories; security aspects; single sign-on; Authentication; Grid computing; Public key cryptography; Smart cards; Authentication; CL-PKC; Grid Computing; IDBC; Kerberos; PKI;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Engineering and Technology (ICET), 2012 International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-4673-4808-9
Type :
conf
DOI :
10.1109/ICEngTechnol.2012.6396116
Filename :
6396116
Link To Document :
بازگشت