{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:45Z","timestamp":1750308105778,"version":"3.41.0"},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2005,11,1]],"date-time":"2005-11-01T00:00:00Z","timestamp":1130803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2005,11]]},"abstract":"<jats:p>Grid technology is increasingly being looked upon as a natural extension of the internet for engaging in complex data processing tasks over resources which are distributed across the world. Architects and developers employing grid systems must take into consideration security implications. Dynamic generation of virtual organizations leads to a synergistic picture which has to address security requirements never encountered before. Globus toolkit has devised a framework for making secure use of grid resource components which has been proved to be a feasible solution by a number of academic and scientific organizations. This paper is an attempt to identify and discern mechanisms proposed by Globus security model with certain test scenarios.<\/jats:p>","DOI":"10.1145\/1102107.1102112","type":"journal-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T18:14:10Z","timestamp":1139249650000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Globus security model for grid environment"],"prefix":"10.1145","volume":"30","author":[{"given":"Nitin V.","family":"Kanaskar","sequence":"first","affiliation":[{"name":"University of Arkansas at Little Rock, Little Rock, AR"}]},{"given":"Umit","family":"Topaloglu","sequence":"additional","affiliation":[{"name":"University of Arkansas at Little Rock, Little Rock, AR"}]},{"given":"Coskun","family":"Bayrak","sequence":"additional","affiliation":[{"name":"University of Arkansas at Little Rock, Little Rock, AR"}]}],"member":"320","published-online":{"date-parts":[[2005,11]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Ian Foster Carl Kesselman Steven Tuecke \"The Anatomy of Grid Enabling Scalable Virtual Organizations\" online at http:\/\/www.globus.org\/alliance\/publications\/papers\/anatomy.pdf  Ian Foster Carl Kesselman Steven Tuecke \"The Anatomy of Grid Enabling Scalable Virtual Organizations\" online at http:\/\/www.globus.org\/alliance\/publications\/papers\/anatomy.pdf"},{"key":"e_1_2_1_2_1","unstructured":"Ian Foster Carl Kesselman Jeffrey M. Nick Steven Tuecke \"The Physiology of the Grid An Open Grid Services Architecture for Distributed Systems Integration\" online at http:\/\/www.globus.org\/alliance\/publications\/papers\/ogsa.pdf  Ian Foster Carl Kesselman Jeffrey M. Nick Steven Tuecke \"The Physiology of the Grid An Open Grid Services Architecture for Distributed Systems Integration\" online at http:\/\/www.globus.org\/alliance\/publications\/papers\/ogsa.pdf"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288111"},{"volume-title":"Conventional Distributed Computing Environments and Computational Grids,\" online at http:\/\/www.mathcs.emory.edu\/dcl\/h2o\/papers\/grids_iccs02","author":"Nemeth Zsolt","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","unstructured":"Nataraj Nagaratnam Philippe Janson John Dayka Anthony Nadalin Frank Siebenlist Von Welch Ian Foster Steve Tuecke \"The Security Architecture for Open Grid Services\" online at http:\/\/www.cs.virginia.edu\/~humphrey\/ogsa-sec-wg\/OGSA-SecArch-v1-07192002.pdf  Nataraj Nagaratnam Philippe Janson John Dayka Anthony Nadalin Frank Siebenlist Von Welch Ian Foster Steve Tuecke \"The Security Architecture for Open Grid Services\" online at http:\/\/www.cs.virginia.edu\/~humphrey\/ogsa-sec-wg\/OGSA-SecArch-v1-07192002.pdf"},{"key":"e_1_2_1_6_1","unstructured":"Jim Basney \"Using the MyProxy Online Credential Repository\" online at http:\/\/www.globusworld.org\/2005Slides\/Session%204b(2).pdf  Jim Basney \"Using the MyProxy Online Credential Repository\" online at http:\/\/www.globusworld.org\/2005Slides\/Session%204b(2).pdf"},{"key":"e_1_2_1_7_1","unstructured":"Olivier Chevassut \"Secure (one -time-)Password Authentication for the Globus Toolkit\" online at http:\/\/www.globusworld.org\/2005Slides\/Session%207b(3).pdf  Olivier Chevassut \"Secure (one -time-)Password Authentication for the Globus Toolkit\" online at http:\/\/www.globusworld.org\/2005Slides\/Session%207b(3).pdf"},{"key":"e_1_2_1_8_1","unstructured":"http:\/\/www.globus.org\/toolkit\/docs\/3.2\/installation\/index.html  http:\/\/www.globus.org\/toolkit\/docs\/3.2\/installation\/index.html"},{"key":"e_1_2_1_9_1","unstructured":"http:\/\/www.globus.org\/toolkit\/docs\/3.2\/installation\/install_config.html  http:\/\/www.globus.org\/toolkit\/docs\/3.2\/installation\/install_config.html"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102107.1102112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102107.1102112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:07Z","timestamp":1750262887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102107.1102112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11]]},"references-count":9,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2005,11]]}},"alternative-id":["10.1145\/1102107.1102112"],"URL":"https:\/\/doi.org\/10.1145\/1102107.1102112","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2005,11]]},"assertion":[{"value":"2005-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}