Filters








146,077 Hits in 3.5 sec

A Specification for Security Services on Computational Grids [chapter]

Franco Arcieri, Fabio Fioravanti, Enrico Nardelli, Maurizio Talamo
2004 Lecture Notes in Computer Science  
In this paper we present a computational infrastructure, the Security Backbone, which is able to satisfy security requirements arising from resource sharing and services interoperability in Grid-like environments  ...  In this paper we present a computational infrastructure, the Security Backbone, which is able to satisfy security requirements arising from resource sharing and services interoperability in Grid-like environments  ...  An alternative solution to PKI infrastructures for providing security services on a grid is presented in Section 2.  ... 
doi:10.1007/978-3-540-30190-5_9 fatcat:i4an5munafchldwchanhhvveva

Intra-engine service security for grids based on WSRF

M. Smith, T. Friese, B. Freisleben
2005 CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005.  
In this paper, a solution to the problem of intra-engine interservice security for ad hoc grid environments based on WSRF is presented.  ...  It relies on the features provided by a hot deployment service developed for ad hoc grids.  ...  inter-service security for all services.  ... 
doi:10.1109/ccgrid.2005.1558625 dblp:conf/ccgrid/SmithFF05 fatcat:awrepnyusfhrzg2cz5fxwaze4y

Privacy Enhanced Personal Services for Smart Grids

Zekeriya Erkin, Thijs Veugen
2014 Proceedings of the 2nd Workshop on Smart Energy Grid Security - SEGS '14  
It is expected that the data collected for the management can also be utilized for other personalized services using other business partners.  ...  We provide a scientific method to provide new services for smart homes while protecting the privacy-sensitive data.  ...  PRIVACY ENHANCED PERSONALIZED SERVICES In this section, we present a privacy enhanced version of a recommender system for smart grids.  ... 
doi:10.1145/2667190.2667193 dblp:conf/ccs/ErkinV14 fatcat:qznbabckrzcabhrpe2kxh35bd4

Using Security Patterns for Modelling Security Capabilities in Grid Systems

Benjamin Aziz, Clive Blackwell
2014 2014 IEEE 8th International Symposium on Service Oriented System Engineering  
We extend previous work on formalising design patterns to start the development of security patterns for Grid systems.  ...  A number of Grid security management capabilities that aid the secure settingup and running of a Grid are presented.  ...  security issues for the entire system rather than just the services.  ... 
doi:10.1109/sose.2014.60 dblp:conf/sose/AzizB14 fatcat:rqn76a75orczrexyj3oo5lwtm4

Security Attack Ontology for Web Services

A. Vorobiev, Jun Han
2006 2006 Semantics, Knowledge and Grid, Second International Conference on  
We develop the security attack ontology for WS and illustrate the benefits of using it with an example.  ...  In this paper, we describe WS security threats and state that they have to be analysed and classified systematically in order to allow the development of better distributed defensive mechanisms for WS  ...  Attacks on Web services Proceedings of the Second International Conference on Semantics, Knowledge, and Grid (SKG'06) 0-7695-2673-X/06 $20.00 © 2006 WS have been designed to allow various technologies  ... 
doi:10.1109/skg.2006.85 dblp:conf/skg/VorobievH06a fatcat:kdgalwqlunhljdvjchbvachiwi

Providing secure coordinated access to grid services

David W. Chadwick, Linying Su, Romain Laborde
2006 Proceedings of the 4th international workshop on Middleware for grid computing - MCG '06  
In our initial implementation, the coordination service is imbedded into the GT4 authorization chain as a custom PDP so that any web service can be provided with a security policy that provides a coordination  ...  Coordinating the cumulative use of distributed resources in a grid environment so that users do not consume too much is a difficult task.  ...  Thirdly, by making the coordination database a grid service, we get the benefits of secure communications between the PEP and the service using the existing grid security infrastructure (GSI) [5] .  ... 
doi:10.1145/1186675.1186677 dblp:conf/middleware/ChadwickSL06 fatcat:w3zwfu74qvet7fjpt3ytveyvvq

Extending the security assertion markup language to support delegation for Web services and grid services

Jun Wang, D. Del Vecchio, M. Humphrey
2005 IEEE International Conference on Web Services (ICWS'05)  
By leveraging existing Web Services standards, we make it easier for Grid practitioners to build and consume Web and Grid Services without resorting to Grid-specific protocols.  ...  We develop a set of verification rules for delegation tokens that rely on WS-Security X.509 signatures, but do not force any trust relationship between the delegatee and the target service.  ...  Acknowledgements We are thankful to Von Welch of Argonne National Lab and Steven Newhouse, Deputy Director of the Open Middleware Infrastructure Institute (OMII) for helping us to clarify the presentation  ... 
doi:10.1109/icws.2005.59 dblp:conf/icws/WangVH05 fatcat:qwabw4z535b5hm6sb3ymzbh3ge

Middleware for semantic-based security and safety management of open services

Stefan Poslad, Juan Jim Tan, Xuan Huang, Landong Zuo
2005 International Journal of Web and Grid Services  
Reference to this paper should be made as follows: Poslad, S., Tan, J.J., Huang, X. and Zuo, L. (2005) 'Middleware for semantic-based security and safety management of open services', Int.  ...  The main objective of this paper is to show how an existing semantic-based security management of open services framework has been extended to improve the safety of services using a semantic error management  ...  Syntactical specifications of security from the W3C, OASIS, WS-Security and Grid consortia support the representation of security information using XML but these have no semantic metadata models of security  ... 
doi:10.1504/ijwgs.2005.008392 fatcat:lot6cmu5iva2nctzsjuxjqleaq

Security Risk Assessment-based Cloud Migration Methodology for Smart Grid OT Services

Bojan Jelacic, Imre Lendak, Sebastijan Stoja, Marina Stanojevic, Daniela Rosic
2020 Acta Polytechnica Hungarica  
The primary goal of this paper is to present a security risk assessment-based methodology for migrating sensitive Smart grid operational technology (OT) services to the computing cloud, either on or off-premise  ...  We created a baseline system architecture diagram for smart grid Industrial Control Systems (ICS) aligned with the IEC-62443 model of security zones.  ...  for their OT services.  ... 
doi:10.12700/aph.17.5.2020.5.6 fatcat:rwcox5ydlzbc7dljb7dus6wvai

Role-Based Access Control for Grid Database Services Using the Community Authorization Service

A.L. Pereira, V. Muppavarapu, S.M. Chung
2006 IEEE Transactions on Dependable and Secure Computing  
In this paper, we propose a role-based access control (RBAC) method for Grid database services in Open Grid Services Architecture-Data Access and Integration (OGSA-DAI).  ...  information for individual Grid users.  ...  (VO) roles for Grid database services.  ... 
doi:10.1109/tdsc.2006.26 fatcat:27345rlvb5fmlerskctwzncdt4

PRE+: dual of proxy re-encryption for secure cloud data sharing service

Xu An Wang, Fatos Xhafa, Jianfeng Ma, Leonard Barolli, Yunlong Ge
2018 International Journal of Web and Grid Services  
In this paper, aiming at providing secure cloud data sharing services in cloud storage, we propose a scalable and controllable cloud data sharing framework for cloud users (called: Scanf).  ...  Thus our Scanf framework based on PRE + can also achieve these two properties, which is very important for users of cloud storage sharing service.  ...  Licheng Wang for many helpful comments. This work was supported by Natural Science  ... 
doi:10.1504/ijwgs.2018.088394 fatcat:ap337qhj5bhcff3dnwgtt54ydi

Grid resource discovery based on web services

D. Cokuslu, A. Hameurlain, K. Erciyes
2009 2009 International Conference for Internet Technology and Secured Transactions, (ICITST)  
Grid resource discovery using web services is an important approach which has resulted in many tools to become de facto standards of today's grid resource management.  ...  Resource discovery in grid systems is a fundamental task which provides searching and locating necessary resources for a given process.  ...  Most web service based methods use grid resource discovery techniques which are not suitable for large scale.  ... 
doi:10.1109/icitst.2009.5402543 fatcat:xfm6d2q2uffc7ag6w7bmxlvlfq

Decentralized, Adaptive Services: The AspectIX Approach for a Flexible and Secure Grid Environment [chapter]

Rüdiger Kapitza, Franz J. Hauck, Hans Reiser
2004 Lecture Notes in Computer Science  
In this paper we present EDAS, an environment for decentralized, adaptive services.  ...  This environment offers flexible service models based on distributed mobile objects ranging from a traditional client-server scenario to a fully peer-to-peer based approach.  ...  This level is used for a secure and fault tolerant distribution of a service. As mentioned above a decentralized, adaptive service consists of different parts.  ... 
doi:10.1007/978-3-540-30190-5_8 fatcat:kvcgty5jdbdm5oodv4rpxaqyje

A XKMS-Based Security Framework for Mobile Grid into the XML Web Services [chapter]

Namje Park, Kiyoung Moon, Jongsu Jang, Sungwon Sohn
2004 Lecture Notes in Computer Science  
The initialization protocol is prerequisite for invoking Grid web services securely.  ...  Security Service Model for Open Mobile Grid Middleware particular method at a specific time.  ... 
doi:10.1007/978-3-540-24688-6_19 fatcat:b6lr7oqm2zh27ljfiv5juhvcrq

Event-oriented dynamic security service for demand response in smart grid employing mobile networks

Longhua Guo, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li
2015 China Communications  
In this paper, event-oriented dynamic security service for smart grid employing mobile network is proposed to enhance the security of DR event.  ...  Three kinds of security services including security access service, security communication service and security analysis service for DR event are composited dynamically by the fine-grained sub services  ...  Security access service To evaluate the performance of the proposed security access service for DR, we performed experiments in the network of State Grid Corporation of China (SGCC).  ... 
doi:10.1109/cc.2015.7385529 fatcat:spbrwe4s3fhghmgiyoavu5cecq
« Previous Showing results 1 — 15 out of 146,077 results