The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With increasing development of Internet, grid as a new structure of distributed network will be discussed more and more, while its security is facing the heavy challenge and restricts application of grid. The international research shows that grid security is on the way to trustworthy grid. Apart from current trust model, the future trust model in grid should add users' behaviors reflecting users'...
Facing the enlarging scale of Grid and its increasing number of users, the Grid Service Providers (GSPs) need to evaluate and manage the trust of all users effectively. A D-S-theory-based multi-level trust evaluation model is proposed in this paper to solve the problem. In accord with the architecture for Grid, this model makes the result more reasonable and accurate, restrains the attacks such as...
Mobile Grid is one of the recent emerging technologies. It has a lot of challenges due to the scarcity of resources such as processing power, persistent storage, runtime heap, battery lifetime, memory, bandwidth, and connectivity and network faults. Dynamic environment affects both mobile and non-mobile grids. This creates a need for the virtual administrator. Virtual Organization (VO) is responsible...
An equivalent price based algorithm is proposed, which applies the combinatorial double auction and trust theories into grid resource allocation and pricing. Firstly the price adjusting function is designed, which maps the nodes' bid prices under various trust values into the equivalent prices under base trust degree. Then the grid resources are allocated and priced based on combinatorial double auction...
The grid is an heterogeneous distributed environment, it has many new characteristics that are different with the traditional Internet, for example, it have many users and resources. These characteristics have decided complexity of the grid safety mechanism. Thus security is an important element of the practical of grid computing technology. In paper, we described a hybrid model of authentication...
It is a big challenge to realize the dynamic selection and integration of the grid service component in the dynamic, cross-organizational grid environment. This paper introduces a dynamic-reconfigurable grid model (DRGM) with SOA. Reconfigurable idea is introduced to this model, and the implementation framework and method are proposed, so DRGM can support dynamic-reconfiguration at a lower level for...
Peer-to-Peer (P2P) electronic commerce greatly enhances the convenience and flexibility of e-business, but it also aggravates the risk and security threatening business activity. In order to prevent the vulnerable peers from involving in transaction and solve the trust problem of no-history record peers, this paper proposes a new trust model of P2P e-commerce, which is based on voting agreement. It...
The access control is the multitudinous computer security solution one kind, also is the most direct-viewing most natural one kind of plan, but based on role access control (RBAC) is the most influential high-level access control model, however, as a result of the grid cross organization, the tendency, isomerism characteristic, established the access control in the grid coordination design system...
The next generation Internet will be highly diversified in both underlying networking technologies and supported networking applications. The diversified Internet architecture requires effective collaboration among heterogeneous network domains to support various application requirements. One of the challenges to achieve this objective lies in enabling network domain collaboration and network-application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.