The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Grid system has many great security challenges such as access control. The attribute-based access control model (ABAC) has much merits that are more flexible, fine-grained and dynamically suitable to grid environment. As an important factor in grid security, trust is increasingly applied to management of security, especially in access control. This paper puts forward a novel trust model in multi-domain...
Web Services are at the heart of many Internet-based e-business systems. Security issues in web services are critical for the continuity of the provided services. Solutions such as Role-Based Access Control and Trust-Based Access Control were proposed to address threats to security in single Web Service scenarios. These solutions do not fully provide the required security level in situations related...
Trust plays an important role in all commercial grid and cloud environments. It is the estimation of competence of a resource provider in completing a task based on reliability, security, capability and availability in the context of distributed environment. It enables users to select the best resources in the heterogeneous grid and cloud infrastructure. This paper introduces a novel trust model to...
Techniques for building local area network clusters differ from those used for large scale harvesting of idle computing power. The overlapping non dedicated clusters (ONDC) architecture is trying to mix advantages of both techniques. Clusters build in ONDC style can be deployed both on small scale local networks, but as well in large scale over the Internet deployments. In this paper we analyze the...
Trustworthy network is the inevitable trend in the development of high trusted computing and Internet. It is beyond the traditional information security including confidentiality, integrity and availability, but on the survivability and controllability. Trustworthiness of users on identity and behaviors is very important for trustworthy network, which can be realized by access control technology....
Trust based access control models have recently attracted significant interest in the area of pervasive computing. In several trust based models, organizations are required to establish a set of trust beliefs regarding their neighboring nodes. In an organization there may be multiple administrators or the administrators may change with time. When multiple administrators contribute to the creation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.