A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
The Design of Rijndael
Server-Assisted Generation of a Strong Secret from a Password
WETICE '00 Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
The GridPort Toolkit: A System for Building Grid Portals
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
GridSphere: An Advanced Portal Framework
EUROMICRO '04 Proceedings of the 30th EUROMICRO Conference
The MyProxy online credential repository: Research Articles
Software—Practice & Experience - Grid Security
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
Shemp: secure hardware enhanced myproxy
Shemp: secure hardware enhanced myproxy
Access Control Systems: Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models
An Improved MyProxy System in Grid
ICHIT '06 Proceedings of the 2006 International Conference on Hybrid Information Technology - Volume 01
Introduction to Cryptography with Coding Theory (2nd Edition)
Introduction to Cryptography with Coding Theory (2nd Edition)
Globus toolkit version 4: software for service-oriented systems
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
Hi-index | 0.00 |
In this work, we provide some insights about the problem of managing credentials in grid environments. Since user mobility is a very common requirement in grid implementations, centralized credential servers are frequently used to store their cryptographic keys. We study some possible solutions for environments with stronger requirements regarding non-repudiation, where the use of credential servers may not be acceptable.