2007
DOI: 10.1016/j.istr.2007.05.009
|View full text |Cite
|
Sign up to set email alerts
|

Grid security: Next steps

Abstract: One of the more mature instances of a serviceoriented architecture is the model known as Grid Computing. Computational Grids and Data Grids are becoming commonplace in certain sectors, yet the style of security they implement is suitable only for a fairly small subset of possible user communities. Using some case studies and experience, we describe the existing Grid security models, explain why they represent shortcomings for some applications, and describe some emerging architectures, Trusted Computing and vi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2008
2008
2012
2012

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 39 publications
(47 reference statements)
0
5
0
1
Order By: Relevance
“…Several systems have been built using trusted computing concepts such as the Next Generation Secure Computing Base by Microsoft [59], Trusted Execution Technology by Intel [3], secure co-processors by IBM [25], [1], and others [40], [47], [49], [73]. In addition, researchers have developed systems that utilize the TPM for anonymous attestation [69], authentication [21], [56], device attestation [30], [52], digital rights management [45], digital signature [9], [71], distributed computing [35], [67], drive encryption [26], e-voting [75], grid security [48], [50], [51], identity management [43], [54], mobile agents [58], [62], on-line payment [12], on-line storage [76], peer-to-peer networks [11], [38], policy enforcement [5], [63], [66], and virtualization [13], [29]. These studies, however, do not consider a security service that will hide information from the rest of the system including the system administrator as in blind processing.…”
Section: Tpm-based Blind Communicationmentioning
confidence: 99%
“…Several systems have been built using trusted computing concepts such as the Next Generation Secure Computing Base by Microsoft [59], Trusted Execution Technology by Intel [3], secure co-processors by IBM [25], [1], and others [40], [47], [49], [73]. In addition, researchers have developed systems that utilize the TPM for anonymous attestation [69], authentication [21], [56], device attestation [30], [52], digital rights management [45], digital signature [9], [71], distributed computing [35], [67], drive encryption [26], e-voting [75], grid security [48], [50], [51], identity management [43], [54], mobile agents [58], [62], on-line payment [12], on-line storage [76], peer-to-peer networks [11], [38], policy enforcement [5], [63], [66], and virtualization [13], [29]. These studies, however, do not consider a security service that will hide information from the rest of the system including the system administrator as in blind processing.…”
Section: Tpm-based Blind Communicationmentioning
confidence: 99%
“…The application of trusted computing to Grid Computing has been widely discussed (see, for example, [23,24,50,94]). Much of this work aims to prevent or detect resource provider misbehaviour.…”
Section: Network Applicationsmentioning
confidence: 99%
“…Application of TC to Grid Security: A number of authors have considered how Trusted computing could be applied to Grid Computing [4,5,15,24]; the main goal of much of this prior art is to prevent or detect resource provider misbehaviour. Mao et al [3] propose Daonity, a system which establishes a relocatable key enabling controlled group sharing of encrypted content.…”
Section: Trusted Computingmentioning
confidence: 99%
“…The application of Trusted Computing (TC) technology is emerging as a potential solution to a number of Grid security problems [14,15] and this paper investigates how this technology may be applied to secure Grid workflows. Section 2 provides a brief summary of Grid workflows, and outlines a set of security requirements.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation