# Abstract

$B:r:#$N5^B.$J%M%C%H%o!<%/5;=Q$NH/E8$K$h$jJ,;69b@-G=7W;;$,2DG=$H$J$j!"(B $B$3$l$r;Y1g$9$k%=%U%H%&%'%"%U%l!<%%o!<%/$H$7$F(B $B$o$l$o$l$N(BNinf$B$r4^$4v$D$+$N%7%9%F%$,Ds>'$5$l$F$*$j!"(B $B5;=QE*$K$b@.=O$7$D$D$"$k!#(B
$B$7$+$7!"$3$Ne$K$"$k!#(B $BK\9F$G$O$3$NZ$r$H$j$"$2!"(B $BJ,;69b@-G=7W;;$KMW@A$5$l$kG'>Z5!9=$K$D$$FO@8k!#(B BG'>ZN6/EYH%7%9%F%MxMQN4JJX@-O%H%l!<%I%*%UN4X78K"j!"(B B%7%9%F%`N;HMQ7ABVK1~8FJ#?tNG'>Z5!9=r;H$$J,$1$k$3$H$,(B $B=EMW$G$"\$k!#(B

Rapid growth of network technology made high-performance distributed computing possible, Technical aspects of software framework for high-performance distributed computing are already almost established.
However, from social aspect, some important issues still remain open, i.e, access control or accounting. In this paper, we discuss authentication mechanism which is needed for the above issues.
Strictness of authentication and easiness of system usage are tradeoff. Authentication machanism have to be choosen according to system usage. \end{eabstract}