Overview of security considerations for computational and data grids

Large-scale science and engineering is frequently done through the interaction of collaborating groups, heterogeneous computing resources, information systems, and instruments, all of which are geographically and organizationally dispersed. The overall motivation for "Grids" is to enable t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Johnston, W.E., Jackson, K.R., Talwar, S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 440
container_issue
container_start_page 439
container_title
container_volume
creator Johnston, W.E.
Jackson, K.R.
Talwar, S.
description Large-scale science and engineering is frequently done through the interaction of collaborating groups, heterogeneous computing resources, information systems, and instruments, all of which are geographically and organizationally dispersed. The overall motivation for "Grids" is to enable the routine interactions of these resources to enhance this type of large-scale science and engineering, and thus substantially increase the computing and data handling capabilities available to science and engineering projects. However, even if this environment works in every other way, it will not be viable if it is constantly disrupted by hackers and their kin. Distributed applications are potentially more vulnerable than conventional scientific problem solving environments because there are substantially more targets to attack in order to impact a single application. Much of the overall security of Grids is inherited from the security of the underlying systems. There are, however, some security considerations at the Grid level that are independent of the underlying systems, and we focus on this latter aspect.
doi_str_mv 10.1109/HPDC.2001.945216
format Conference Proceeding
fullrecord <record><control><sourceid>proquest_6IE</sourceid><recordid>TN_cdi_ieee_primary_945216</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>945216</ieee_id><sourcerecordid>31676954</sourcerecordid><originalsourceid>FETCH-LOGICAL-i234t-f4eaa654eb41279682262580a530dae5fe93291cb94164f21c01c4b1488391673</originalsourceid><addsrcrecordid>eNqFkL1PwzAQxS0BEqV0R0ye2FJ854_EI2qBIlUqA8yRk1yQUdoUOynqf49F2bnlTk8_Pb13jN2AmAMIe796XS7mKATMrdII5oxdidxYDWhNcc4mIArMCivySzaL8VOkUVpZNBO23BwoHDx9877lkeox-OHI634XfUPBDT5dvO1Dkrb7cfgVXMfdruGNGxz_CL6J1-yidV2k2d-esvenx7fFKltvnl8WD-vMo1RD1ipyzmhFlQLMUzREg7oQTkvRONItWYkW6soqMKpFqAXUqgJVFNKCyeWU3Z1896H_GikO5dbHmrrO7agfYykTlGqrf0HMhbTJMIG3J9ATUbkPfuvCsTx9Uf4AUAJkwg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>27039673</pqid></control><display><type>conference_proceeding</type><title>Overview of security considerations for computational and data grids</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Johnston, W.E. ; Jackson, K.R. ; Talwar, S.</creator><creatorcontrib>Johnston, W.E. ; Jackson, K.R. ; Talwar, S.</creatorcontrib><description>Large-scale science and engineering is frequently done through the interaction of collaborating groups, heterogeneous computing resources, information systems, and instruments, all of which are geographically and organizationally dispersed. The overall motivation for "Grids" is to enable the routine interactions of these resources to enhance this type of large-scale science and engineering, and thus substantially increase the computing and data handling capabilities available to science and engineering projects. However, even if this environment works in every other way, it will not be viable if it is constantly disrupted by hackers and their kin. Distributed applications are potentially more vulnerable than conventional scientific problem solving environments because there are substantially more targets to attack in order to impact a single application. Much of the overall security of Grids is inherited from the security of the underlying systems. There are, however, some security considerations at the Grid level that are independent of the underlying systems, and we focus on this latter aspect.</description><identifier>ISSN: 1082-8907</identifier><identifier>ISBN: 0769512968</identifier><identifier>ISBN: 9780769512969</identifier><identifier>DOI: 10.1109/HPDC.2001.945216</identifier><language>eng</language><publisher>IEEE</publisher><subject>Collaboration ; Computer hacking ; Data engineering ; Data handling ; Data security ; Grid computing ; Information security ; Information systems ; Instruments ; Large-scale systems</subject><ispartof>Proceedings 10th IEEE International Symposium on High Performance Distributed Computing, 2001, p.439-440</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/945216$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,25139,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/945216$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Johnston, W.E.</creatorcontrib><creatorcontrib>Jackson, K.R.</creatorcontrib><creatorcontrib>Talwar, S.</creatorcontrib><title>Overview of security considerations for computational and data grids</title><title>Proceedings 10th IEEE International Symposium on High Performance Distributed Computing</title><addtitle>HPDC</addtitle><description>Large-scale science and engineering is frequently done through the interaction of collaborating groups, heterogeneous computing resources, information systems, and instruments, all of which are geographically and organizationally dispersed. The overall motivation for "Grids" is to enable the routine interactions of these resources to enhance this type of large-scale science and engineering, and thus substantially increase the computing and data handling capabilities available to science and engineering projects. However, even if this environment works in every other way, it will not be viable if it is constantly disrupted by hackers and their kin. Distributed applications are potentially more vulnerable than conventional scientific problem solving environments because there are substantially more targets to attack in order to impact a single application. Much of the overall security of Grids is inherited from the security of the underlying systems. There are, however, some security considerations at the Grid level that are independent of the underlying systems, and we focus on this latter aspect.</description><subject>Collaboration</subject><subject>Computer hacking</subject><subject>Data engineering</subject><subject>Data handling</subject><subject>Data security</subject><subject>Grid computing</subject><subject>Information security</subject><subject>Information systems</subject><subject>Instruments</subject><subject>Large-scale systems</subject><issn>1082-8907</issn><isbn>0769512968</isbn><isbn>9780769512969</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2001</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNqFkL1PwzAQxS0BEqV0R0ye2FJ854_EI2qBIlUqA8yRk1yQUdoUOynqf49F2bnlTk8_Pb13jN2AmAMIe796XS7mKATMrdII5oxdidxYDWhNcc4mIArMCivySzaL8VOkUVpZNBO23BwoHDx9877lkeox-OHI634XfUPBDT5dvO1Dkrb7cfgVXMfdruGNGxz_CL6J1-yidV2k2d-esvenx7fFKltvnl8WD-vMo1RD1ipyzmhFlQLMUzREg7oQTkvRONItWYkW6soqMKpFqAXUqgJVFNKCyeWU3Z1896H_GikO5dbHmrrO7agfYykTlGqrf0HMhbTJMIG3J9ATUbkPfuvCsTx9Uf4AUAJkwg</recordid><startdate>20010101</startdate><enddate>20010101</enddate><creator>Johnston, W.E.</creator><creator>Jackson, K.R.</creator><creator>Talwar, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20010101</creationdate><title>Overview of security considerations for computational and data grids</title><author>Johnston, W.E. ; Jackson, K.R. ; Talwar, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i234t-f4eaa654eb41279682262580a530dae5fe93291cb94164f21c01c4b1488391673</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Collaboration</topic><topic>Computer hacking</topic><topic>Data engineering</topic><topic>Data handling</topic><topic>Data security</topic><topic>Grid computing</topic><topic>Information security</topic><topic>Information systems</topic><topic>Instruments</topic><topic>Large-scale systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Johnston, W.E.</creatorcontrib><creatorcontrib>Jackson, K.R.</creatorcontrib><creatorcontrib>Talwar, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Johnston, W.E.</au><au>Jackson, K.R.</au><au>Talwar, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Overview of security considerations for computational and data grids</atitle><btitle>Proceedings 10th IEEE International Symposium on High Performance Distributed Computing</btitle><stitle>HPDC</stitle><date>2001-01-01</date><risdate>2001</risdate><spage>439</spage><epage>440</epage><pages>439-440</pages><issn>1082-8907</issn><isbn>0769512968</isbn><isbn>9780769512969</isbn><abstract>Large-scale science and engineering is frequently done through the interaction of collaborating groups, heterogeneous computing resources, information systems, and instruments, all of which are geographically and organizationally dispersed. The overall motivation for "Grids" is to enable the routine interactions of these resources to enhance this type of large-scale science and engineering, and thus substantially increase the computing and data handling capabilities available to science and engineering projects. However, even if this environment works in every other way, it will not be viable if it is constantly disrupted by hackers and their kin. Distributed applications are potentially more vulnerable than conventional scientific problem solving environments because there are substantially more targets to attack in order to impact a single application. Much of the overall security of Grids is inherited from the security of the underlying systems. There are, however, some security considerations at the Grid level that are independent of the underlying systems, and we focus on this latter aspect.</abstract><pub>IEEE</pub><doi>10.1109/HPDC.2001.945216</doi><tpages>2</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1082-8907
ispartof Proceedings 10th IEEE International Symposium on High Performance Distributed Computing, 2001, p.439-440
issn 1082-8907
language eng
recordid cdi_ieee_primary_945216
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Collaboration
Computer hacking
Data engineering
Data handling
Data security
Grid computing
Information security
Information systems
Instruments
Large-scale systems
title Overview of security considerations for computational and data grids
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T23%3A23%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Overview%20of%20security%20considerations%20for%20computational%20and%20data%20grids&rft.btitle=Proceedings%2010th%20IEEE%20International%20Symposium%20on%20High%20Performance%20Distributed%20Computing&rft.au=Johnston,%20W.E.&rft.date=2001-01-01&rft.spage=439&rft.epage=440&rft.pages=439-440&rft.issn=1082-8907&rft.isbn=0769512968&rft.isbn_list=9780769512969&rft_id=info:doi/10.1109/HPDC.2001.945216&rft_dat=%3Cproquest_6IE%3E31676954%3C/proquest_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=27039673&rft_id=info:pmid/&rft_ieee_id=945216&rfr_iscdi=true