Negotiation of Multilateral Security Decisions for Grid Computing

نویسندگان

  • Li Zhou
  • Clifford Neuman
چکیده

Grid computing enables the sharing of heterogeneous resources within virtual organizations. Since entities in virtual organizations are independently administrated, cross-domain management of access control and intrusion protection is critical for grid services. To provide better protection in grid systems, multiple domains collaborate in making security decisions. Unfortunately, the absence of global trust makes coordination of multilateral decisions difficult. In this paper, we introduce the Grid Access Control and Intrusion Protection Architecture that facilitates the collaboration in making security decisions for grid services. In particular, we present a design of Trust-based Security Variable that assists the negotiation of multilateral security decisions according to the level of trust among grid service providers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient multilateral negotiation system for pervasive computing environments

In this paper we propose an automated negotiation system that can efficiently carry out multilateral negotiations with multi-attributes in pervasive computing environments. For the multilateral negotiation system proposed in our study, an e-commerce framework for pervasive computing environments in which the components can dynamically join and disjoin a virtual market is also introduced. This f...

متن کامل

Enhancing Grid Security Using Trusted Virtualization1

Grid applications increasingly have sophisticated functional and security requirements. Current techniques mostly protect the grid resource provider from attacks by the grid user, while leaving the user comparatively dependent on the well-behavior of the provider. We present the key components for a trustworthy grid architecture and address this trust asymmetry by using a combination of trusted...

متن کامل

Enhancing Grid Security Using Trusted Virtualization

Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks by the user, while leaving the user comparatively dependent on the well-behavior of the resource provider. In this paper, we take the first steps towards addressing the trust asymmetry by using a combination of trusted computi...

متن کامل

Enhancing Grid Security Using Trusted Virtualization

Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks by the user, while leaving the user comparatively dependent on the well-behavior of the resource provider. In this paper, we take the first steps towards addressing the trust asymmetry by using a combination of trusted computi...

متن کامل

Game-based Models of Grid Users’ Decisions in Security Aware Scheduling

This chapter summarizes our recent research on game-theoretical models of grid users’ behavior in security aware scheduling. The main scheduling attributes, generic model of security aware management in local grid clusters and several scenarios of users’ games are presented. Four GA-based hybrid schedulers have been implemented for the approximation of the equilibrium states of exemplary simple...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004