A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Evaluating grid portal security
Proceedings of the 2006 ACM/IEEE conference on Supercomputing
Web Services and Grid Security Vulnerabilities and Threats Analysis and Model
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
A Policy-Based Accountability Tool for Grid Computing Systems
APSCC '08 Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference
The Design and Evaluation of Accountable Grid Computing System
ICDCS '09 Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems
Distributed Systems Security: Issues, Processes and Solutions
Distributed Systems Security: Issues, Processes and Solutions
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
Future Generation Computer Systems
Hi-index | 0.00 |
Grid is designed with no security in mind at first. The complexity and scalability of grid architecture make easy for intruders to attack the system in several ways. In this paper, we discuss several possible or known vulnerabilities existing in each layer of the grid system. Attackers can take advantage of such vulnerabilities to break into grid systems and exploit grid resource to launch Denial of Service attack targeting servers located outside the grid such as mission critical web servers, or internal node inside the grid by shutting down one of important grid components.