期刊文献+

基于网格虚拟组织的分层分布式密钥协议

Hierarchical Distributed Key Protocol Based on Grid Virtual Organization
下载PDF
导出
摘要 分析了网格计算系统中面向虚拟组织的动态组密钥管理需求,讨论了基于虚拟组织成员选择环境的"虚拟组织4层结构"和"成员加入策略",给出了分层分布式密钥协议,避免在密钥的集中式分发与管理模式中,出现单点失败的情况,并具有了层次结构的优点。 This paper analyzes desires of dynamic group key managerment oriented to vitual organization in grid computing system, investigates the four layers architecture of the VO based on selective environment by members in VO and the policy of member admission, and gives a layered distributed key protocol which appropriate to the VO of four layers architecture, the protocol can avoid the abuse of the centralized distribution and the single-point failure exists in the management pattern, also possesses the benefit of layered architecture.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第17期40-42,共3页 Computer Engineering
基金 国家"863"计划基金(2003AA148020 2003AA413031)
关键词 虚拟组织 密钥管理 网格计算系统 层次结构 virtual organization key management grid computing system hiberarchical structure
  • 相关文献

参考文献8

  • 1Foster I,Kesselman C,Tuecke S.The Anatomy of the Grid:Enabling Scalable Virtual Organizations[J].Intl.Journal of Supercomputer Applications,2001,15(3):200-222.
  • 2Foster I,Kesselman C,Nick J M,et al.The Physiology of the Grid:An Open Grid Services Architecture for Distributed Systems Integration[EB/OL].(2002-02).http://www.globus.org/alliance/ publications/papers/ogsa.pdf.
  • 3Harney H,Muckenhirn C.Group Key Management Protocol Specification[S].RFC 2093,1997.
  • 4Harney H,Muckenhirn C.Group Key Management Protocol Archi-tecture[S].RFC 2094,1997.
  • 5Setiner M,Taudik G,Waidnet M.Cliques:A New Approach to Group Key Agreement[R].IBM Research,Tech.Report:RZ2984,1997.
  • 6Caronni G,Waldvogel M,Sun D,et al.Efficient Security for Large and Dynamic Multicast Groups[C]//Proc.of the 7th IEEE Workshop on Enabling Technologies.1998.
  • 7Mittra S.Iolus:A Framework for Scalable Secure Multicasting[J].ACM SIGCOMM Computer Communication Review,1997,27(4):277-288.
  • 8Kurnio H,Safavinaini R,Wang H.A Group Key Distribution Scheme with Decentralised User Join[C]//Proceedings of the 3rd Conference on Security in Communication Networks.2002:146-163.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部