A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Fine Grained Access Control with Trust and Reputation Management for Globus
[chapter]
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS
We propose an integrated architecture, extending a framework for fine grained access control of Grid computational services, with an inference engine managing reputation and trust management credentials ...
Globus GRAM JVM computational resource OS PEP Gmon Java application behavioural PDP system calls intercepted system calls permitted/denied trust / reputation predicate Credential manager Access rules RTML ...
Conclusions In this paper, we have enriched our framework for fine-grained access control on the Grid, by adding a RTML-based inference engine, managing trust and reputation credentials. ...
doi:10.1007/978-3-540-76843-2_26
dblp:conf/otm/ColomboMMPV07
fatcat:awwsm5gy4bcrhm6jh5p555tboe
Fine-Grained Continuous Usage Control of Service Based Grids – The GridTrust Approach
[chapter]
2008
Lecture Notes in Computer Science
Access control techniques designed for single domain infrastructures, where users are known by domain administrators, provide considerable liberty in the usage of resources. ...
The framework is composed of security and trust services and tools provided at the middleware and Grid foundation middleware layers. ...
preferences and their trust and reputation credentials; VOs with their owner and security policies; service providers with their services and the fine-grained security policies regulating access and usage ...
doi:10.1007/978-3-540-89897-9_21
fatcat:tbl3h7lbjbdrvjujdl3l6wubye
Usage Control, Risk and Trust
[chapter]
2010
Lecture Notes in Computer Science
In addition, next to the classical checks for usage control: checks of conditions, authorizations, and obligations, the framework also includes trust and risk management functionalities. ...
It allows both GRID services level enforcement of UCON as well as fine-grained one at the level of local GRID node resources. ...
within a preliminary prototype of fine-grained usage control system for GRID. ...
doi:10.1007/978-3-642-15152-1_1
fatcat:etu7olennzb3xjo2dvuzuzrbp4
Using Secure Auctions to Build a Distributed Metascheduler for the Grid
[chapter]
2009
Market-Oriented Grid and Utility Computing
fine grained with little to no risk. ...
more relaxed, allocations will be of a fine to medium grained nature with less risk than the wholesale market. ...
doi:10.1002/9780470455432.ch25
fatcat:imjbjxqgknc3rlosiwvegk3ykm
A Secure and Scalable Grid-Based Content Management System
2010
2010 International Conference on Availability, Reliability and Security
The solution facilitates the fine-grained usage control of the storage resources and a reputation-based matching between resource policies and users' past behaviour. ...
We present in this paper a secure and scalable Grid-based content management system for the management of high-volume multimedia data in the domain of the publishing industry. ...
and enforcing usage control policies, and finally, the Reputation Management service used for the matching of resource policies with users' past behaviour. ...
doi:10.1109/ares.2010.80
dblp:conf/IEEEares/AzizACCC10
fatcat:bv2awa65cbh6xjtrhwvmrc3mfi
Automating Security Configuration for the Grid
2005
Scientific Programming
In this paper we discuss a system to provide automated support for administrative requests, such as resource reservation and user account management. ...
We outline how these metrics can be implemented using trust management techniques into a practical system we call GridAdmin. ...
John Morrison and the Centre for Unified Computing for their contributions to this work. ...
doi:10.1155/2005/657947
fatcat:juq2pqhmezbnlop3lliabjtvty
Ad hoc grid security infrastructure
2005
The 6th IEEE/ACM International Workshop on Grid Computing, 2005.
It focuses on identity management, identity verification, and authorization control in spontaneous Grid collaborations without pre-established policies or environments. ...
It adopts established community standards, with modifications where needed. This paper also discusses the integration of the ad hoc Grid security infrastructure in an ad hoc Grid implementation. ...
Although CAS and the VOMS-based system enable the Grid communities to manage their own fine-grained trust relationships, they differ from AGSI in their strong reliance on the CAS and VOMS servers, respectively ...
doi:10.1109/grid.2005.1542726
dblp:conf/grid/AminLSMH05
fatcat:p2k7d2yzozhcxhf3qfvhhmbko4
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
2010
2010 International Conference on Complex, Intelligent and Software Intensive Systems
In this work, we present an extension of S×C enriched with an automatic trust management infrastructure. ...
Indeed, we enhance the already existing architecture by adding new modules and configurations for contracts managing. ...
ACKNOWLEDGEMENT We thank the anonymous referees of IMIS10 for valuable comments that helped us to improve this paper. ...
doi:10.1109/cisis.2010.33
dblp:conf/cisis/CostaDLMMM10
fatcat:pkwui6jq2jgvhgkeiprdy5b6ja
A Trusted Data Storage Infrastructure for Grid-Based Medical Applications
2008
2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID)
Most existing Grid technology has been foremost designed with performance and scalability in mind. ...
When using Grid infrastructure for medical applications, privacy and security considerations become paramount. ...
Acknowledgments We thank Oscar Koeroo, Dennis van Dok, and David Groep (NIKHEF) for valuable insight in the gLite-based VL-e infrastructure, as well as Keith Cover (VU Medical Center) for information on ...
doi:10.1109/ccgrid.2008.84
dblp:conf/ccgrid/NoordendeOKL08
fatcat:ap556padwjboxitxg3kcy3iajy
A Trusted Data Storage Infrastructure for Grid-Based Medical Applications
2009
International Journal of Grid and High Performance Computing
Most existing Grid technology has been foremost designed with performance and scalability in mind. ...
When using Grid infrastructure for medical applications, privacy and security considerations become paramount. ...
Acknowledgments We thank Oscar Koeroo, Dennis van Dok, and David Groep (NIKHEF) for valuable insight in the gLite-based VL-e infrastructure, as well as Keith Cover (VU Medical Center) for information on ...
doi:10.4018/jghpc.2009040101
fatcat:hnxadng2vjawbae6m4xhehgp7e
Security-by-Contract-with-Trust for Mobile Devices
2010
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
The main advantage of this method is an automatic management of the level of trust of software and contract releasers and a unified way for dealing with both security and trust. ...
Indeed, we enrich the S×C architecture by integrating a trust model and adding new modules and configurations for managing contracts. ...
Acknowledgement We thank the anonymous referees of IMIS10 for valuable comments that helped us to improve this paper. ...
doi:10.22667/jowua.2010.12.31.075
dblp:journals/jowua/CostaLMMISDM10
fatcat:24p7ixfxjvfflotr7scd4m4hvy
A Survey on Trust Aware Security and Scheduling in Traditional and Ad Hoc Grids
2016
International Journal of Computer Applications
The paper focuses mainly on the similarities and differences in the trust awareness of grid security and job scheduling in the traditional and ad hoc grid environments. ...
The ad hoc grid infrastructure was proposed as a consequence of the need for the short-term collaborations. ...
With the growth of grid popularity the enforcement of access control based only on user's identity become insufficient and more fine-grained access control was necessary. ...
doi:10.5120/ijca2016908058
fatcat:bkozltovx5b3xbmtu7kudonmqq
The Challenge of Dynamic Services in Business Process Management
2011
International Journal for Digital Society (IJDS)
For business processes these adaptations yield challenges in terms of process modeling, delivery and execution. ...
As a result Service-Oriented Architectures (SOA) has to adopt new methods of service security, service management and service execution. ...
As users can define specific policies on their data negotiations and management of data and service provider access becomes more fine grained and subject to change. ...
doi:10.20533/ijds.2040.2570.2011.0065
fatcat:cvuqivdyzjgmlesjrhxm3jrsi4
Deliberate Secure Grid Computing Blueprint Design in Indian Context
2012
International Journal of Computer Network and Information Security
We propose a secure blueprint design for grid systems that addresses requirements for single sign-on, interoperability with local policies of any grid city of India, with dynamically varying resource demands ...
The purpose of Grid technologies is to support the secure sharing and scalable coordinated use of diverse resources in dynamic, distributed VOs. ...
Both scenarios require fine-grain rights. The ability to delegate access rights directly is also needed to provide for the necessary scalability of grid security solutions. ...
doi:10.5815/ijcnis.2012.06.05
fatcat:ernnnsbj7rhftfjzsnif4mee3u
Grid security: Next steps
2007
Information Security Technical Report
Using some case studies and experience, we describe the existing Grid security models, explain why they represent shortcomings for some applications, and describe some emerging architectures, Trusted Computing ...
Computational Grids and Data Grids are becoming commonplace in certain sectors, yet the style of security they implement is suitable only for a fairly small subset of possible user communities. ...
[39] who propose the Binding Instructions aNd Data (BIND) system, which is designed for fine-grained remote attestation of selected code that is important to the verifier. ...
doi:10.1016/j.istr.2007.05.009
fatcat:vghhkchby5elrbh6quwu2xmh3m
« Previous
Showing results 1 — 15 out of 136 results