期刊文献+

Managing Security in Advanced Computational Infrastructure

Managing Security in Advanced Computational Infrastructure
下载PDF
导出
摘要 Proposed by Education Ministry of China, Advanced Computational Infrastructure (ACI) aims at sharing geographically distributed high-performance computing and huge-capacity data resource among the universities of China. With the fast development of large-scale applications in ACI, the security requirements become more and more urgent. The special security needs in ACI is first analyzed in this paper, and security management system based on ACI is presented. Finally, the realization of security management system is discussed.
出处 《Journal of Shanghai University(English Edition)》 CAS 2001年第z1期1-4,共4页 上海大学学报(英文版)
  • 相关文献

参考文献8

  • 1[1]http://www. npaci.edu
  • 2[2]http://www. ncsa.edu
  • 3[3]Li SanLi, Huang ZhenChun, He Chuan, SUTH-A Testbed of Advanced Computational Infrastructure, Technology Report,Tsinghua University, 2001
  • 4[4]Hickman K. and Elgamal T, The SSL Protocol Internet Draft,Netscape Communications Corp., June 1995
  • 5[5]Ylonen T., Kivinen T and Saarinen M., SSH Protocol Architecture, Intemet draft, November 1997
  • 6[6]http://www. vpnc.org
  • 7[7]Atkinson R.,RFC 1826: IP Authentication Header, August 1995
  • 8[8]Karn P., et al., The ESP Triple DES Transform, RFC 1851,September 1995

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部