PROCHÁZKA, Michal and Daniel KOUŘIL. Survey of Authentication Mechanisms for Grids. In CESNET Conference 2008. Praha: CESNET, z.s.p.o. 10 pp. ISBN 978-80-904173-0-4. 2008.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Survey of Authentication Mechanisms for Grids
Name in Czech Přehled autentizačních mechanizmů použitelných pro gridy
Authors PROCHÁZKA, Michal (203 Czech Republic, belonging to the institution) and Daniel KOUŘIL (203 Czech Republic, guarantor, belonging to the institution).
Edition Praha, CESNET Conference 2008, 10 pp. 2008.
Publisher CESNET, z.s.p.o.
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Czech Republic
Confidentiality degree is not subject to a state or trade secret
RIV identification code RIV/00216224:14610/08:00042391
Organization unit Institute of Computer Science
ISBN 978-80-904173-0-4
UT WoS 000271023300005
Keywords in English PKI; Kerberos; SAML; OTP; Proxy certificate; grid
Tags GRID, Kerberos, OTP, PKI, proxy certificate, rivok, SAML
Tags International impact, Reviewed
Changed by Changed by: Mgr. Marta Novotná Buršíková, učo 15689. Changed: 28/3/2011 11:32.
Abstract
A proper authentication mechanism is the very basic requirement for building a secure environment. Recently, a lot of effort has been invested in development of various types of authentication mechanisms that offer strong security characteristics for building grid systems. Being based on one of the mechanisms, most grid environments today provide strong authentication protocols, however, they are usually bound with only one, in most cases based on public key infrastructure (PKI). Such an arrangement works pretty well, but unnecessarily limits users since they are required to use only the one mechanism, which may not be flexible or convenient. A better solution would be to offer users a freedom to choose their own authentication mechanism and provide automatic translations that guarantee that all services and components are securely available regardless of the choice of authentication mechanism. In this paper we provide a survey of authentication mechanisms that are used in current grids and other distributed systems and discuss transition mechanisms between them.
PrintDisplayed: 28/3/2024 20:22