The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Considering OGSA architecture, this paper introduces a new Grid Security System Based on Middleware (GSSBM). The grid includes many different domains; it can make use of middleware technology to implement grid security. Integrating the GSI and PKI technologies, the architecture can solve the single sign-on, authentication, proxy and user-based trust model.
In open service grid, to establish trust relationships among different domains is a basic problem. This paper proposes a layered trust model based on behavior to enhance grid security and extensibility. The upper layer establishes and maintains recommendation trust relationships between different domains in grid; lower layer is in charge of evaluating trust value of entities in his domain. We give...
Grid is the next generation of Internet, and it has attracted the attentions of research communities recently. In practical applications, the nodes in the grid domain need to transact with other strange nodes to acquire the services provided by those nodes. Recently, trust has been recognized as an important factor for Grid security. And it is important for them to make a trust evaluation for those...
With increasing development of Internet, grid as a new structure of distributed network will be discussed more and more, while its security is facing the heavy challenge and restricts application of grid. The international research shows that grid security is on the way to trustworthy grid. Apart from current trust model, the future trust model in grid should add users' behaviors reflecting users'...
Grid security infrastructure (GSI) provides an efficient mechanism to solve security problems using conventional public key infrastructure (PKI). The notion of certificateless public key cryptography gives another efficient cryptographic primitive to support Grid security services. In the recent work, Wang et al. proposed the first certificateless authentication and key agreement protocol (CL-AK)...
Security has been a major concern for grid computing systems owing to their dynamic nature, heterogenity, scalability and presence of multiple domains. Grid security has always been viewed as an authentication problem rather than an authorization issue. Accessing resources across a secure channel is essential in a grid scenario. In this paper, we present a cross domain role-based delegation and revocation...
The dynamic change of users and resources would incur the overall inconsistency of the access policies between different domains in grid. This would have a bad effect on the grid operations, and compromise the grid system. To address the problem, this paper proposes an automated negotiation engine combining with the authorization mechanism. The engine can detect timely the change of access policies,...
Trust management, with trust collecting mechanism as one of its foundations, has been the focus of more and more researches in grid security. This paper analyzes shortages of existing trust collecting mechanisms, and then proposes a novel trust collecting mechanism by introducing the idea of publish/subscribe scheme used in messaging system. The objective of this mechanism is to support dynamic trust...
Due to the nowadays increasing applications of grid computing technology, the risks of grid security are growing, such as the problem of access control inter-domain in grid environment. Recently, trust management is considered as an effective approach for enhancing grid security. As the fuzzy feature of trust and the advantage of fuzzy theory for trust representation and reasoning, this paper presents...
The need for security is particularly acute when highspeed Internet connections are used to combine widespread computational resources into Grids. It is envisioned that in real Grids there will be many usage scenarios where collaborations will take place among small and dynamic working groups. For this to happen, the ability to establish transient collaboration with little or no intervention from...
The trust in grid is becoming increasingly more and more popular. Trust has been recognized as an important factor for grid security. In the SEUGrid, the security strategies are almost static, contrary to the dynamicity of the grid environment. Considering this problem, this paper proposes a trust model imitating the trust system in real world. The primary application goal of SEUGrid is to run AMS-02...
Data-driven computational science on community computational resources is frequently of a magnitude and scale that it requires that computations be done remotely, generating resulting data collections that are too large to be shipped back to a user's workstation. Service-oriented middleware is well equipped to carry out actions on behalf of a user, but SOA middleware does not address user trust in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.