Filters








136 Hits in 5.7 sec

Fine Grained Access Control with Trust and Reputation Management for Globus [chapter]

M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, A. Vaccarelli
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS  
We propose an integrated architecture, extending a framework for fine grained access control of Grid computational services, with an inference engine managing reputation and trust management credentials  ...  Globus GRAM JVM computational resource OS PEP Gmon Java application behavioural PDP system calls intercepted system calls permitted/denied trust / reputation predicate Credential manager Access rules RTML  ...  Conclusions In this paper, we have enriched our framework for fine-grained access control on the Grid, by adding a RTML-based inference engine, managing trust and reputation credentials.  ... 
doi:10.1007/978-3-540-76843-2_26 dblp:conf/otm/ColomboMMPV07 fatcat:awwsm5gy4bcrhm6jh5p555tboe

Fine-Grained Continuous Usage Control of Service Based Grids – The GridTrust Approach [chapter]

Syed Naqvi, Philippe Massonet, Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Paolo Mori, Lorenzo Blasi, Giovanni Cortese
2008 Lecture Notes in Computer Science  
Access control techniques designed for single domain infrastructures, where users are known by domain administrators, provide considerable liberty in the usage of resources.  ...  The framework is composed of security and trust services and tools provided at the middleware and Grid foundation middleware layers.  ...  preferences and their trust and reputation credentials; VOs with their owner and security policies; service providers with their services and the fine-grained security policies regulating access and usage  ... 
doi:10.1007/978-3-540-89897-9_21 fatcat:tbl3h7lbjbdrvjujdl3l6wubye

Usage Control, Risk and Trust [chapter]

Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Artsiom Yautsiukhin
2010 Lecture Notes in Computer Science  
In addition, next to the classical checks for usage control: checks of conditions, authorizations, and obligations, the framework also includes trust and risk management functionalities.  ...  It allows both GRID services level enforcement of UCON as well as fine-grained one at the level of local GRID node resources.  ...  within a preliminary prototype of fine-grained usage control system for GRID.  ... 
doi:10.1007/978-3-642-15152-1_1 fatcat:etu7olennzb3xjo2dvuzuzrbp4

Using Secure Auctions to Build a Distributed Metascheduler for the Grid [chapter]

Kyle Chard, Kris Bubendorfer
2009 Market-Oriented Grid and Utility Computing  
fine grained with little to no risk.  ...  more relaxed, allocations will be of a fine to medium grained nature with less risk than the wholesale market.  ... 
doi:10.1002/9780470455432.ch25 fatcat:imjbjxqgknc3rlosiwvegk3ykm

A Secure and Scalable Grid-Based Content Management System

Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo, Silvio Causetti
2010 2010 International Conference on Availability, Reliability and Security  
The solution facilitates the fine-grained usage control of the storage resources and a reputation-based matching between resource policies and users' past behaviour.  ...  We present in this paper a secure and scalable Grid-based content management system for the management of high-volume multimedia data in the domain of the publishing industry.  ...  and enforcing usage control policies, and finally, the Reputation Management service used for the matching of resource policies with users' past behaviour.  ... 
doi:10.1109/ares.2010.80 dblp:conf/IEEEares/AzizACCC10 fatcat:bv2awa65cbh6xjtrhwvmrc3mfi

Automating Security Configuration for the Grid

Brian C. Clayton, Thomas B. Quillinan, Simon N. Foley
2005 Scientific Programming  
In this paper we discuss a system to provide automated support for administrative requests, such as resource reservation and user account management.  ...  We outline how these metrics can be implemented using trust management techniques into a practical system we call GridAdmin.  ...  John Morrison and the Centre for Unified Computing for their contributions to this work.  ... 
doi:10.1155/2005/657947 fatcat:juq2pqhmezbnlop3lliabjtvty

Ad hoc grid security infrastructure

K. Amin, G. von Laszewski, M. Sosonkin, A.R. Mikler, M. Hategan
2005 The 6th IEEE/ACM International Workshop on Grid Computing, 2005.  
It focuses on identity management, identity verification, and authorization control in spontaneous Grid collaborations without pre-established policies or environments.  ...  It adopts established community standards, with modifications where needed. This paper also discusses the integration of the ad hoc Grid security infrastructure in an ad hoc Grid implementation.  ...  Although CAS and the VOMS-based system enable the Grid communities to manage their own fine-grained trust relationships, they differ from AGSI in their strong reliance on the CAS and VOMS servers, respectively  ... 
doi:10.1109/grid.2005.1542726 dblp:conf/grid/AminLSMH05 fatcat:p2k7d2yzozhcxhf3qfvhhmbko4

Extending Security-by-Contract with Quantitative Trust on Mobile Devices

Gabriele Costa, Nicola Dragoni, Aliaksandr Lazouski, Fabio Martinelli, Fabio Massacci, Ilaria Matteucci
2010 2010 International Conference on Complex, Intelligent and Software Intensive Systems  
In this work, we present an extension of S×C enriched with an automatic trust management infrastructure.  ...  Indeed, we enhance the already existing architecture by adding new modules and configurations for contracts managing.  ...  ACKNOWLEDGEMENT We thank the anonymous referees of IMIS10 for valuable comments that helped us to improve this paper.  ... 
doi:10.1109/cisis.2010.33 dblp:conf/cisis/CostaDLMMM10 fatcat:pkwui6jq2jgvhgkeiprdy5b6ja

A Trusted Data Storage Infrastructure for Grid-Based Medical Applications

Guido J. van 't Noordende, Silvia D. Olabarriaga, Matthijs R. Koot, Cees Th.A.M. de Laat
2008 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID)  
Most existing Grid technology has been foremost designed with performance and scalability in mind.  ...  When using Grid infrastructure for medical applications, privacy and security considerations become paramount.  ...  Acknowledgments We thank Oscar Koeroo, Dennis van Dok, and David Groep (NIKHEF) for valuable insight in the gLite-based VL-e infrastructure, as well as Keith Cover (VU Medical Center) for information on  ... 
doi:10.1109/ccgrid.2008.84 dblp:conf/ccgrid/NoordendeOKL08 fatcat:ap556padwjboxitxg3kcy3iajy

A Trusted Data Storage Infrastructure for Grid-Based Medical Applications

Guido J. van 't Noordende, Silvia D. Olabarriaga, Matthijs R. Koot, Cees Th. A.M. de Laat
2009 International Journal of Grid and High Performance Computing  
Most existing Grid technology has been foremost designed with performance and scalability in mind.  ...  When using Grid infrastructure for medical applications, privacy and security considerations become paramount.  ...  Acknowledgments We thank Oscar Koeroo, Dennis van Dok, and David Groep (NIKHEF) for valuable insight in the gLite-based VL-e infrastructure, as well as Keith Cover (VU Medical Center) for information on  ... 
doi:10.4018/jghpc.2009040101 fatcat:hnxadng2vjawbae6m4xhehgp7e

Security-by-Contract-with-Trust for Mobile Devices

Gabriele Costa, Aliaksandr Lazouski, Fabio Martinelli, Ilaria Matteucci, Valérie Issarny, Rachid Saadi, Nicola Dragoni, Fabio Massacci
2010 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
The main advantage of this method is an automatic management of the level of trust of software and contract releasers and a unified way for dealing with both security and trust.  ...  Indeed, we enrich the S×C architecture by integrating a trust model and adding new modules and configurations for managing contracts.  ...  Acknowledgement We thank the anonymous referees of IMIS10 for valuable comments that helped us to improve this paper.  ... 
doi:10.22667/jowua.2010.12.31.075 dblp:journals/jowua/CostaLMMISDM10 fatcat:24p7ixfxjvfflotr7scd4m4hvy

A Survey on Trust Aware Security and Scheduling in Traditional and Ad Hoc Grids

Slavomír Kavecký, Penka Martincová
2016 International Journal of Computer Applications  
The paper focuses mainly on the similarities and differences in the trust awareness of grid security and job scheduling in the traditional and ad hoc grid environments.  ...  The ad hoc grid infrastructure was proposed as a consequence of the need for the short-term collaborations.  ...  With the growth of grid popularity the enforcement of access control based only on user's identity become insufficient and more fine-grained access control was necessary.  ... 
doi:10.5120/ijca2016908058 fatcat:bkozltovx5b3xbmtu7kudonmqq

The Challenge of Dynamic Services in Business Process Management

Tom Kirkham, Sandra Winfield, Thorsten Haberecht, Jens Müller, Guglielmo De Angelis
2011 International Journal for Digital Society (IJDS)  
For business processes these adaptations yield challenges in terms of process modeling, delivery and execution.  ...  As a result Service-Oriented Architectures (SOA) has to adopt new methods of service security, service management and service execution.  ...  As users can define specific policies on their data negotiations and management of data and service provider access becomes more fine grained and subject to change.  ... 
doi:10.20533/ijds.2040.2570.2011.0065 fatcat:cvuqivdyzjgmlesjrhxm3jrsi4

Deliberate Secure Grid Computing Blueprint Design in Indian Context

Sanjeev Puri, Harsh Dev
2012 International Journal of Computer Network and Information Security  
We propose a secure blueprint design for grid systems that addresses requirements for single sign-on, interoperability with local policies of any grid city of India, with dynamically varying resource demands  ...  The purpose of Grid technologies is to support the secure sharing and scalable coordinated use of diverse resources in dynamic, distributed VOs.  ...  Both scenarios require fine-grain rights. The ability to delegate access rights directly is also needed to provide for the necessary scalability of grid security solutions.  ... 
doi:10.5815/ijcnis.2012.06.05 fatcat:ernnnsbj7rhftfjzsnif4mee3u

Grid security: Next steps

Andrew Martin, Po-Wah Yau
2007 Information Security Technical Report  
Using some case studies and experience, we describe the existing Grid security models, explain why they represent shortcomings for some applications, and describe some emerging architectures, Trusted Computing  ...  Computational Grids and Data Grids are becoming commonplace in certain sectors, yet the style of security they implement is suitable only for a fairly small subset of possible user communities.  ...  [39] who propose the Binding Instructions aNd Data (BIND) system, which is designed for fine-grained remote attestation of selected code that is important to the verifier.  ... 
doi:10.1016/j.istr.2007.05.009 fatcat:vghhkchby5elrbh6quwu2xmh3m
« Previous Showing results 1 — 15 out of 136 results