Journal of Systems Engineering and Electronics ›› 2009, Vol. 31 ›› Issue (1): 216-220.

• 软件、算法与仿真 • 上一篇    下一篇

网格计算中虚拟组织的授权机制

邵学军1, 施化吉1,2, 赵曦滨3   

  1. 1. 江苏大学计算机科学与通信工程学院, 江苏, 镇江, 212013;
    2. 南京航空航天大学计算机应用研究所, 江苏, 南京, 210016;
    3. 清华大学软件学院, 北京, 100084
  • 收稿日期:2007-08-28 修回日期:2008-02-25 出版日期:2009-01-20 发布日期:2010-01-03
  • 作者简介:邵学军(1964- ),男,副研究员,主要研究方向为分布式应用与系统集成.E-mail:xjshao@ujs.edu.cn
  • 基金资助:
    国家“863”计划项目(2003AA414031);国家火炬计划项目(2004EB33006)资助课题

Authorization mechanisms for virtual organization in grid computing systems

SHAO Xue-jun1, SHI Hua-ji1,2, ZHAO Xi-bin3   

  1. 1. School of Computer Science and Telecommunications Engineering, Jiangsu Univ., Zhenjiang 212013, China;
    2. Inst. of Computer Application, Nanjing Univ. of Aeronautics and Astronautics, Nanjing 210016, China;
    3. School of Software, Tsinghua Univ., Beijing 100084, China
  • Received:2007-08-28 Revised:2008-02-25 Online:2009-01-20 Published:2010-01-03

摘要: 分析了网格计算系统中虚拟组织管理的授权需求,提出使用门限闭包作为网格计算系统中面向虚拟组织的授权服务机制。既分析了门限闭包的适用性,也指出了它在具体实施时所存在的局限性,在此基础上提出一种新的授权服务体系,设计了基于公钥基础设施PKI的访问控制工作协议,并结合现有网格计算系统的安全基础设施设计了相应的授权服务系统架构。该体系通过分离门限闭包策略和实现机制,既保证了对复杂授权策略的处理效率和处理能力,也充分利用了现有网格安全基础设施。

Abstract: This article analyzes authorized demand for management of virtual organization in the grid computing system and consequently proposes using threshold closure as authorized service mechanism for virtual organizations in the grid computing system.The study not only analyzes the applicability of the threshold closure but presents the limitations of the specific implementation and based on which,a new authorization service system is put forward and the access control protocol based on the public key infrastructure as well as the corresponding authorization service architecture combined with the existing security infrastructure in grid computing system are designed.The architecture guarantees the processing efficiency and capacity of the complex authorized strategy,and meanwhile it makes full use of the existing grid security infrastructure through the separation strategy of the threshold closure and implementation mechanism.

中图分类号: