The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper propose a conception named Trusted Grid and design the model of it, which makes grid computing integrated with trusted computing. The model establishes the trusted grid field by trusted evaluation and adopts security strategy: identity authentication, digital signature, intrusion tolerant for improving on the security and reliability of new grid security and trust (NGST). In addition, this...
Because of highly dynamics, openness and autonomy of grid, effective access control mechanism is required to guarantee secure resource sharing on it. To resolve such problem, reputation and risk are formalized based on cloud model theory in this paper firstly. Subsequently, risk-aware reputation inference, combination and evolvement algorithms are designed respectively. Simulation results show higher...
E-learning has been an important way, method, target and criterion of modern teaching. E-assessment is an important component of e-learning and e-qualification. Item Banks using Item Response Theory are the basis of e-assessment. With the application of WEB technology, how to share item bank resources becomes one of the problems to be solved imperatively in e-assessment. This paper proposes a grid-based...
The security models used in Grid systems today strongly bear the marks of their diverse origin. Historically retrofitted to the distributed systems they are designed to protect and control, the security model is usually limited in scope and applicability, and its implementation tailored towards a few specific deployment scenarios. A common approach towards even the "basic" elements such...
As grid??s dynamic, distributed and open nature, the issue of mutual trust among grid entities is challenging, not only because of the entities in different domains, but also because the fact that those domains may deploy different security mechanisms. A federal authentication and authorization scheme based upon trust management and delegation is proposed. Different security domains can join in the...
To meet the requirements in developing distributed simulation technology, a grid-based distributed simulation platform (GDSP), which was based on latest grid technology and high level architecture (HLA), was proposed. GDSP is the base infrastructure of service-oriented simulation support environment. And it can run simulations on wide area network efficiently, realize share and reuse of simulation...
Especially within grid infrastructures driven by high-performance computing (HPC), collaborative online visualization and steering (COVS) has become an important technique to dynamically steer the parameters of a parallel simulation or to just share the outcome of simulations via visualizations with geographically dispersed collaborators. In earlier work, we have presented a COVS framework reference...
Inherited the flexibility merit of the access control model based on attribute(ABAC), the authorization model based on attribute delegation in grid (GADAM) is put forward, which Expressed the attribute set with attribute expression in this model, and adopted the method based on attribute delegation directly to assign and transmit the permission. Complied with the constraint mechanism of atomic authorization...
Due to the nowadays increasing applications of grid computing technology, the risks of grid security are growing, such as the problem of access control inter-domain in grid environment. Recently, trust management is considered as an effective approach for enhancing grid security. As the fuzzy feature of trust and the advantage of fuzzy theory for trust representation and reasoning, this paper presents...
Trust management has been considered an important factor in Grid computing security. Grids require a secure way to establish trust in their participants without requiring continuous intervention by the system administrators. This paper describes trust management in Grid computing systems and its use in evaluation environments to update the trust levels. This approach can be incorporated in Grid security...
The paper proposes an integral approach to building multilayer security for Grid based virtual collaborative environment that leverages the general user-controlled complex resource provisioning (CRP-UC) model. The CRP-UC is considered as comprising of three layers: trusted computing platform, secure virtualised workspace, and collaborative/application session. The suggestions on the technology selection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.