2008
DOI: 10.1088/1742-6596/119/6/062032
|View full text |Cite
|
Sign up to set email alerts
|

gLExec: gluing grid computing to the Unix world

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(17 citation statements)
references
References 4 publications
0
17
0
Order By: Relevance
“…Tests to run the job with gLExec [6] identity switching have been completed successfully, but it is not mandatory;…”
Section: Overviewmentioning
confidence: 99%
“…Tests to run the job with gLExec [6] identity switching have been completed successfully, but it is not mandatory;…”
Section: Overviewmentioning
confidence: 99%
“…In the absence of solutions based on the virtualization of resources (VM), CREAM implements isolation via local credential mapping, exploiting traditional Unix-level security mechanisms like a separate user account per Grid user or per job. This Unix domain isolation is implemented in the form of the gLExec system [24], a sudo-style program which allows the execution of the user's job with local credentials derived from the user's identity and any accompanying authorization assertions. This relation between the Grid credentials and the local Unix accounts and groups is determined by the Local Credential MAPping Service (LCMAPS) [25].…”
Section: Securitymentioning
confidence: 99%
“…Site managers have expressed concerns about potential security problems caused by the changing of the ownership of the workload executed on a Worker Node. However, the introduction of a glexec authorization tool which can be used on the Worker Nodes to apply site policies to the user workload obtained by the generic pilot agent resolves this problem [14]. …”
Section: Managing Vo Policiesmentioning
confidence: 99%