A Formal Model for the Grid Security Infrastructure
نویسندگان
چکیده
The Grid Security Infrastructure (GSI) proposed and implemented in Globus Toolkit has been a widely accepted solution for the security of grids in recent years. But there is no formal analysis or modelling on security mechanisms of GSI emerging in the literature yet. In this paper, we propose a formal logic, and formalize those primary security mechanisms using the logic. Our formalism not only is useful in understanding GSI but also provides us a substantial theoretic basis for some high-level security mechanisms to be developed based on GSI for the emerging service-oriented grid.
منابع مشابه
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملFarmers’ Perception and Management of Natural Hazards in Production and Security of Farm Investment in Isuikwuato, Abia State, Nigeria
This study on farmers’ perception and management of natural hazards in production and security of farm investment was carried out in Isuikwuato Local Government Area of Abia State, Nigeria. The study was sought to identify farmers’ perceived natural hazards in food production; identify adopted measures used in mitigating impacts of the hazards and determined factors that influenced farmers from...
متن کامل