谷歌浏览器插件
订阅小程序
在清言上使用

Proxy Restrictions for Grid Usage

ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS(2009)

引用 0|浏览2
暂无评分
摘要
The scale and power of Grid infrastructures makes them an inviting target for attack. Even if the Grid software is secure the Grid infrastructure is vulnerable via operating system vulnerabilities and misconfiguration. One of the worst results of the exploit of these vulnerabilities is user proxy credential compromise. This paper describes a pragmatic and simple way, using proxy certificate extensions, to mitigate the damage in case of credential compromise. The potential damage is limited by restricting the range of hosts that the credentials can be used to open connections to and be accepted from. This paper also describes a way to help investigate credential delegation problems.
更多
查看译文
关键词
worst result,credential compromise,proxy restrictions,grid usage,proxy certificate extension,system vulnerability,grid infrastructure,grid software,potential damage,user proxy credential compromise,credential delegation problem,operating system
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要