Loading...
Please wait, while we are loading the content...
Similar Documents
An Access Control Model for Secure Cluster-Computing Environments
| Content Provider | CiteSeerX |
|---|---|
| Author | Li, Wei Allen, Edward B. |
| Abstract | As an emerging domain in high-performance computing, cluster computing is being widely used. However, there is little research work that comprehensively studies the security requirements in cluster-computing environments. Security mechanisms are important for cluster computing, especially when clusters are part of high-assurance systems. In this paper, we discuss security requirements for cluster-computing environments, with an emphasis on access control. A security solution is proposed based on the role-based access control (RBAC) model. Within an RBAC security model, roles are identified for different job assignments. Users are assigned roles according to their job functions. Required permissions are associated with each role. An example illustrates the coordination between the RBAC model and security sensors for cluster computing. RBAC is well suited to a cluster-computing environment and can be readily integrated with various security configurations. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Access Control Model Secure Cluster-computing Environment Cluster-computing Environment Cluster Computing Security Requirement Different Job Assignment Rbac Security Model Security Sensor Little Research Work Access Control High-assurance System Various Security Configuration High-performance Computing Rbac Model Security Solution Role-based Access Control Security Mechanism Job Function |
| Content Type | Text |