Negotiation of Multilateral Security Decisions for Grid Computing
نویسندگان
چکیده
Grid computing enables the sharing of heterogeneous resources within virtual organizations. Since entities in virtual organizations are independently administrated, cross-domain management of access control and intrusion protection is critical for grid services. To provide better protection in grid systems, multiple domains collaborate in making security decisions. Unfortunately, the absence of global trust makes coordination of multilateral decisions difficult. In this paper, we introduce the Grid Access Control and Intrusion Protection Architecture that facilitates the collaboration in making security decisions for grid services. In particular, we present a design of Trust-based Security Variable that assists the negotiation of multilateral security decisions according to the level of trust among grid service providers.
منابع مشابه
An efficient multilateral negotiation system for pervasive computing environments
In this paper we propose an automated negotiation system that can efficiently carry out multilateral negotiations with multi-attributes in pervasive computing environments. For the multilateral negotiation system proposed in our study, an e-commerce framework for pervasive computing environments in which the components can dynamically join and disjoin a virtual market is also introduced. This f...
متن کاملEnhancing Grid Security Using Trusted Virtualization1
Grid applications increasingly have sophisticated functional and security requirements. Current techniques mostly protect the grid resource provider from attacks by the grid user, while leaving the user comparatively dependent on the well-behavior of the provider. We present the key components for a trustworthy grid architecture and address this trust asymmetry by using a combination of trusted...
متن کاملEnhancing Grid Security Using Trusted Virtualization
Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks by the user, while leaving the user comparatively dependent on the well-behavior of the resource provider. In this paper, we take the first steps towards addressing the trust asymmetry by using a combination of trusted computi...
متن کاملEnhancing Grid Security Using Trusted Virtualization
Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks by the user, while leaving the user comparatively dependent on the well-behavior of the resource provider. In this paper, we take the first steps towards addressing the trust asymmetry by using a combination of trusted computi...
متن کاملGame-based Models of Grid Users’ Decisions in Security Aware Scheduling
This chapter summarizes our recent research on game-theoretical models of grid users’ behavior in security aware scheduling. The main scheduling attributes, generic model of security aware management in local grid clusters and several scenarios of users’ games are presented. Four GA-based hybrid schedulers have been implemented for the approximation of the equilibrium states of exemplary simple...
متن کامل