|
计算机应用研究 2005
Research about Grid Computing Authorization
|
Abstract:
Analyzes the most popular secure mechanism GSI in grid computing and the authorization system CAS based on GSI. Proposes own authorization scheme, which is based on local authentication and CAS. Different from GSI and CAS, users in the scheme only need to authenticate to local system before accessing to VO.