Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Grid Security Infrastructure

Known as: GSI, Globus Security Infrastructure 
The Grid Security Infrastructure (GSI), formerly called the Globus Security Infrastructure, is a specification for secret, tamper-proof, delegatable… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Abstract Grid Computing is an emerging computing mode which enables the coordinated sharing of widely distributed resources. It… Expand
Is this relevant?
2008
2008
  • Zhun Cai
  • Second International Conference on the Digital…
  • 2008
  • Corpus ID: 15116923
The globus security infrastructure (GSI) is one of the most famous security architecture. GSI is based on public key… Expand
Is this relevant?
2007
2007
Password-based authentication is still the most widelyused authentication mechanism, largely because of the ease with which it… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2006
2006
A critical problem for grid security is how to gain secure solution for Grid virtual organization (VO). In Grid practice at… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2005
2005
Grid security is a wide topic, touching many of the core issues in information security. It is an area that has been overlooked… Expand
Is this relevant?
2005
2005
The widespread use of grid technology and distributed compute power, with all its inherent benefits, will only be established if… Expand
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2005
2005
In this paper, we propose a grid security infrastructure based on identity cryptography. We mainly discuss the grid security… Expand
Is this relevant?
2005
2005
This paper describes an ad hoc grid security infrastructure developed as a part of the Java CoG Kit project. It supports several… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 3
  • figure 4
Is this relevant?
2000
2000
We present a new model for authorization that integrates both local and distributed access control policies and that is… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
1999
1999
Increasingly, independent institutions with similar goals and interests are forming loosely coupled virtual organizations for… Expand
  • figure 1
  • figure 2
Is this relevant?