A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Specification for Security Services on Computational Grids
[chapter]
2004
Lecture Notes in Computer Science
In this paper we present a computational infrastructure, the Security Backbone, which is able to satisfy security requirements arising from resource sharing and services interoperability in Grid-like environments ...
In this paper we present a computational infrastructure, the Security Backbone, which is able to satisfy security requirements arising from resource sharing and services interoperability in Grid-like environments ...
An alternative solution to PKI infrastructures for providing security services on a grid is presented in Section 2. ...
doi:10.1007/978-3-540-30190-5_9
fatcat:i4an5munafchldwchanhhvveva
Intra-engine service security for grids based on WSRF
2005
CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005.
In this paper, a solution to the problem of intra-engine interservice security for ad hoc grid environments based on WSRF is presented. ...
It relies on the features provided by a hot deployment service developed for ad hoc grids. ...
inter-service security for all services. ...
doi:10.1109/ccgrid.2005.1558625
dblp:conf/ccgrid/SmithFF05
fatcat:awrepnyusfhrzg2cz5fxwaze4y
Privacy Enhanced Personal Services for Smart Grids
2014
Proceedings of the 2nd Workshop on Smart Energy Grid Security - SEGS '14
It is expected that the data collected for the management can also be utilized for other personalized services using other business partners. ...
We provide a scientific method to provide new services for smart homes while protecting the privacy-sensitive data. ...
PRIVACY ENHANCED PERSONALIZED SERVICES In this section, we present a privacy enhanced version of a recommender system for smart grids. ...
doi:10.1145/2667190.2667193
dblp:conf/ccs/ErkinV14
fatcat:qznbabckrzcabhrpe2kxh35bd4
Using Security Patterns for Modelling Security Capabilities in Grid Systems
2014
2014 IEEE 8th International Symposium on Service Oriented System Engineering
We extend previous work on formalising design patterns to start the development of security patterns for Grid systems. ...
A number of Grid security management capabilities that aid the secure settingup and running of a Grid are presented. ...
security issues for the entire system rather than just the services. ...
doi:10.1109/sose.2014.60
dblp:conf/sose/AzizB14
fatcat:rqn76a75orczrexyj3oo5lwtm4
Security Attack Ontology for Web Services
2006
2006 Semantics, Knowledge and Grid, Second International Conference on
We develop the security attack ontology for WS and illustrate the benefits of using it with an example. ...
In this paper, we describe WS security threats and state that they have to be analysed and classified systematically in order to allow the development of better distributed defensive mechanisms for WS ...
Attacks on Web services Proceedings of the Second International Conference on Semantics, Knowledge, and Grid (SKG'06) 0-7695-2673-X/06 $20.00 © 2006 WS have been designed to allow various technologies ...
doi:10.1109/skg.2006.85
dblp:conf/skg/VorobievH06a
fatcat:kdgalwqlunhljdvjchbvachiwi
Providing secure coordinated access to grid services
2006
Proceedings of the 4th international workshop on Middleware for grid computing - MCG '06
In our initial implementation, the coordination service is imbedded into the GT4 authorization chain as a custom PDP so that any web service can be provided with a security policy that provides a coordination ...
Coordinating the cumulative use of distributed resources in a grid environment so that users do not consume too much is a difficult task. ...
Thirdly, by making the coordination database a grid service, we get the benefits of secure communications between the PEP and the service using the existing grid security infrastructure (GSI) [5] . ...
doi:10.1145/1186675.1186677
dblp:conf/middleware/ChadwickSL06
fatcat:w3zwfu74qvet7fjpt3ytveyvvq
Extending the security assertion markup language to support delegation for Web services and grid services
2005
IEEE International Conference on Web Services (ICWS'05)
By leveraging existing Web Services standards, we make it easier for Grid practitioners to build and consume Web and Grid Services without resorting to Grid-specific protocols. ...
We develop a set of verification rules for delegation tokens that rely on WS-Security X.509 signatures, but do not force any trust relationship between the delegatee and the target service. ...
Acknowledgements We are thankful to Von Welch of Argonne National Lab and Steven Newhouse, Deputy Director of the Open Middleware Infrastructure Institute (OMII) for helping us to clarify the presentation ...
doi:10.1109/icws.2005.59
dblp:conf/icws/WangVH05
fatcat:qwabw4z535b5hm6sb3ymzbh3ge
Middleware for semantic-based security and safety management of open services
2005
International Journal of Web and Grid Services
Reference to this paper should be made as follows: Poslad, S., Tan, J.J., Huang, X. and Zuo, L. (2005) 'Middleware for semantic-based security and safety management of open services', Int. ...
The main objective of this paper is to show how an existing semantic-based security management of open services framework has been extended to improve the safety of services using a semantic error management ...
Syntactical specifications of security from the W3C, OASIS, WS-Security and Grid consortia support the representation of security information using XML but these have no semantic metadata models of security ...
doi:10.1504/ijwgs.2005.008392
fatcat:lot6cmu5iva2nctzsjuxjqleaq
Security Risk Assessment-based Cloud Migration Methodology for Smart Grid OT Services
2020
Acta Polytechnica Hungarica
The primary goal of this paper is to present a security risk assessment-based methodology for migrating sensitive Smart grid operational technology (OT) services to the computing cloud, either on or off-premise ...
We created a baseline system architecture diagram for smart grid Industrial Control Systems (ICS) aligned with the IEC-62443 model of security zones. ...
for their OT services. ...
doi:10.12700/aph.17.5.2020.5.6
fatcat:rwcox5ydlzbc7dljb7dus6wvai
Role-Based Access Control for Grid Database Services Using the Community Authorization Service
2006
IEEE Transactions on Dependable and Secure Computing
In this paper, we propose a role-based access control (RBAC) method for Grid database services in Open Grid Services Architecture-Data Access and Integration (OGSA-DAI). ...
information for individual Grid users. ...
(VO) roles for Grid database services. ...
doi:10.1109/tdsc.2006.26
fatcat:27345rlvb5fmlerskctwzncdt4
PRE+: dual of proxy re-encryption for secure cloud data sharing service
2018
International Journal of Web and Grid Services
In this paper, aiming at providing secure cloud data sharing services in cloud storage, we propose a scalable and controllable cloud data sharing framework for cloud users (called: Scanf). ...
Thus our Scanf framework based on PRE + can also achieve these two properties, which is very important for users of cloud storage sharing service. ...
Licheng Wang for many helpful comments. This work was supported by Natural Science ...
doi:10.1504/ijwgs.2018.088394
fatcat:ap337qhj5bhcff3dnwgtt54ydi
Grid resource discovery based on web services
2009
2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
Grid resource discovery using web services is an important approach which has resulted in many tools to become de facto standards of today's grid resource management. ...
Resource discovery in grid systems is a fundamental task which provides searching and locating necessary resources for a given process. ...
Most web service based methods use grid resource discovery techniques which are not suitable for large scale. ...
doi:10.1109/icitst.2009.5402543
fatcat:xfm6d2q2uffc7ag6w7bmxlvlfq
Decentralized, Adaptive Services: The AspectIX Approach for a Flexible and Secure Grid Environment
[chapter]
2004
Lecture Notes in Computer Science
In this paper we present EDAS, an environment for decentralized, adaptive services. ...
This environment offers flexible service models based on distributed mobile objects ranging from a traditional client-server scenario to a fully peer-to-peer based approach. ...
This level is used for a secure and fault tolerant distribution of a service. As mentioned above a decentralized, adaptive service consists of different parts. ...
doi:10.1007/978-3-540-30190-5_8
fatcat:kvcgty5jdbdm5oodv4rpxaqyje
A XKMS-Based Security Framework for Mobile Grid into the XML Web Services
[chapter]
2004
Lecture Notes in Computer Science
The initialization protocol is prerequisite for invoking Grid web services securely. ...
Security Service Model for Open Mobile Grid Middleware particular method at a specific time. ...
doi:10.1007/978-3-540-24688-6_19
fatcat:b6lr7oqm2zh27ljfiv5juhvcrq
Event-oriented dynamic security service for demand response in smart grid employing mobile networks
2015
China Communications
In this paper, event-oriented dynamic security service for smart grid employing mobile network is proposed to enhance the security of DR event. ...
Three kinds of security services including security access service, security communication service and security analysis service for DR event are composited dynamically by the fine-grained sub services ...
Security access service To evaluate the performance of the proposed security access service for DR, we performed experiments in the network of State Grid Corporation of China (SGCC). ...
doi:10.1109/cc.2015.7385529
fatcat:spbrwe4s3fhghmgiyoavu5cecq
« Previous
Showing results 1 — 15 out of 146,077 results