Filters








5 Hits in 1.8 sec

Daonity

Wenbo Mao, Fei Yan, Chunrun Chen
2006 Proceedings of the first ACM workshop on Scalable trusted computing - STC '06  
Trusted Computing (TC) technology can add to grid computing the needed property of behaviour conformity.  ...  A central security requirement for grid computing can be referred to as behaviour conformity.  ...  Clearly no existing grid security mechanism can achieve the conformed behaviour as can Daonity for the manifested usecase.  ... 
doi:10.1145/1179474.1179486 dblp:conf/ccs/MaoYC06 fatcat:lzdyiwm4k5dp3opoonhidxrose

Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment [chapter]

Wenbo Mao, Fei Yan, Chuanjiang Yi, Haibo Chen
2010 Lecture Notes in Computer Science  
Trusted Computing (TC) technology can add to grid computing the needed property of behaviour conformity.  ...  A central security requirement for grid computing can be referred to as behaviour conformity.  ...  We have argued that trusted computing technology, thanks to its inherent properties of group-oriented security and system behaviour conformity, can provide suitable solutions to the identified grid security  ... 
doi:10.1007/978-3-642-17773-6_27 fatcat:lubhqe7hcngcjegozmprmszj6a

Grid security: Next steps

Andrew Martin, Po-Wah Yau
2007 Information Security Technical Report  
Using some case studies and experience, we describe the existing Grid security models, explain why they represent shortcomings for some applications, and describe some emerging architectures, Trusted Computing  ...  Computational Grids and Data Grids are becoming commonplace in certain sectors, yet the style of security they implement is suitable only for a fairly small subset of possible user communities.  ...  To avoid confusion, we will state that a platform will meet 'conformed behaviour' instead of 'trusted' as used in Trusted Computing parlance.  ... 
doi:10.1016/j.istr.2007.05.009 fatcat:vghhkchby5elrbh6quwu2xmh3m

Trusted Computing: Security and Applications

Eimear Gallery, Chris J. Mitchell
2009 Cryptologia  
The main objective of this paper is to highlight some of the major security and application issues confronting trusted computing technology.  ...  Following a brief introduction to the history of trusted computing, we provide a summary of its main features.  ...  Acknowledgements The development of this article was sponsored by the Open Trusted Computing project of the European Commission Framework 6 Programme.  ... 
doi:10.1080/01611190802231140 fatcat:slr52mewqrbxtg6orjxes4valy

可信计算平台测评理论与关键技术研究

2010 Scientia Sinica Informationis  
Daonity: grid security with behaviour conformity from trusted computing. In: Mitchell C, ed. The First ACM Workshop on Scalable Trusted Computing.  ...  An Open Trusted Computing Architecture Secure Virtual Machines Enabling User Defined Policy Enforcement. Open Trusted Computing (OpenTC) Consortium. Technical Report. Shen C, Zhang H, Feng D, et al.  ... 
doi:10.1360/zf2010-40-2-167 fatcat:jaxjrtw6jrgpppdqxbctuajuea