001     129001
005     20210129211210.0
020 _ _ |a 978-3-89336-829-7
037 _ _ |a FZJ-2013-00524
100 1 _ |a Holl, Sonja
|0 P:(DE-Juel1)132139
|b 0
|e Corresponding author
111 2 _ |a UNICORE Summit 2012
|c Dresden
|d 2012-05-30 - 2012-05-31
|w Germany
245 _ _ |a Secure Multi-Level Parallel Execution of Scientific Workflows on HPC Grid Resources by Combining Taverna and UNICORE Services
260 _ _ |a Jülich
|c 2012
|b Forschungszentrum Jülich
295 1 0 |a UNICORE Summit 2012, Proceedings, 30 - 31 May 2012 | Dresden, Germany
300 _ _ |a 8 p.
336 7 _ |a Contribution to a conference proceedings
|b contrib
|m contrib
|0 PUB:(DE-HGF)8
|s 1390305756_21017
|2 PUB:(DE-HGF)
336 7 _ |a Contribution to a book
|0 PUB:(DE-HGF)7
|2 PUB:(DE-HGF)
|m contb
336 7 _ |a Conference Paper
|0 33
|2 EndNote
336 7 _ |a CONFERENCE_PAPER
|2 ORCID
336 7 _ |a Output Types/Conference Paper
|2 DataCite
336 7 _ |a conferenceObject
|2 DRIVER
336 7 _ |a INPROCEEDINGS
|2 BibTeX
490 0 _ |a Schriften des Forschungszentrums Jülich, IAS Series
|v 15
|0 PERI:(DE-600)2525100-4
500 _ _ |3 POF3_Assignment on 2016-02-29
520 _ _ |a Scientific workflows have emerged as a flexible and easily comprehensible way to implement complex multi-step data analysis problems. With surging data volumes and rising complexity of these workflows the demand for parallel, distributed execution of such workflows in high performance computing (HPC) and high throughput computing (HTC) environments has increased significantly. One of the major challenges when migrating client based tools to large distributed environments is security. Some workflow management systems (WMS) like Taverna, a system widely used in the life science community, provide basic security features. Hence, during the execution of a Taverna workflow on the client individual workflow steps can be securely distributed via UNICORE on the Grid. But WMS generally lack extended security mechanisms, such as trust delegation to support an extended distributed Grid submission mechanism of entire workflows. We describe a novel security propagation mechanism in this paper to enable a secure workflow submission. Additionally, we describe our optimization use case and its performance in an established three tier Grid architecture.
536 _ _ |a 412 - Grid Technologies and Infrastructures (POF2-412)
|0 G:(DE-HGF)POF2-412
|c POF2-412
|x 0
|f POF II
536 _ _ |a 411 - Computational Science and Mathematical Methods (POF2-411)
|0 G:(DE-HGF)POF2-411
|c POF2-411
|x 1
|f POF II
700 1 _ |a Zimmermann, Olav
|0 P:(DE-Juel1)132307
|b 1
700 1 _ |a Demuth, Bastian
|0 P:(DE-Juel1)132081
|b 2
700 1 _ |a Schuller, Bernd
|0 P:(DE-Juel1)132261
|b 3
700 1 _ |a Hofmann-Apitius, Martin
|0 P:(DE-HGF)0
|b 4
773 _ _ |p 27-34
909 _ _ |p VDB
|o oai:juser.fz-juelich.de:129001
909 C O |o oai:juser.fz-juelich.de:129001
|p VDB
910 1 _ |a Forschungszentrum Jülich GmbH
|0 I:(DE-588b)5008462-8
|k FZJ
|b 0
|6 P:(DE-Juel1)132139
910 1 _ |a Forschungszentrum Jülich GmbH
|0 I:(DE-588b)5008462-8
|k FZJ
|b 1
|6 P:(DE-Juel1)132307
910 1 _ |a Forschungszentrum Jülich GmbH
|0 I:(DE-588b)5008462-8
|k FZJ
|b 2
|6 P:(DE-Juel1)132081
910 1 _ |a Forschungszentrum Jülich GmbH
|0 I:(DE-588b)5008462-8
|k FZJ
|b 3
|6 P:(DE-Juel1)132261
913 2 _ |a DE-HGF
|b Key Technologies
|l Supercomputing & Big Data
|1 G:(DE-HGF)POF3-510
|0 G:(DE-HGF)POF3-519H
|2 G:(DE-HGF)POF3-500
|v Addenda
|x 0
913 1 _ |a DE-HGF
|b Schlüsseltechnologien
|l Supercomputing
|1 G:(DE-HGF)POF2-410
|0 G:(DE-HGF)POF2-412
|2 G:(DE-HGF)POF2-400
|v Grid Technologies and Infrastructures
|x 0
|4 G:(DE-HGF)POF
|3 G:(DE-HGF)POF2
913 1 _ |a DE-HGF
|b Schlüsseltechnologien
|l Supercomputing
|1 G:(DE-HGF)POF2-410
|0 G:(DE-HGF)POF2-411
|2 G:(DE-HGF)POF2-400
|v Computational Science and Mathematical Methods
|x 1
|4 G:(DE-HGF)POF
|3 G:(DE-HGF)POF2
914 1 _ |y 2012
920 1 _ |0 I:(DE-Juel1)JSC-20090406
|k JSC
|l Jülich Supercomputing Center
|x 0
980 _ _ |a contrib
980 _ _ |a VDB
980 _ _ |a UNRESTRICTED
980 _ _ |a contb
980 _ _ |a I:(DE-Juel1)JSC-20090406


LibraryCollectionCLSMajorCLSMinorLanguageAuthor
Marc 21