Skip to main content

A Grid Security Infrastructure Based on Behaviors and Trusts

  • Conference paper
Grid and Cooperative Computing - GCC 2004 Workshops (GCC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3252))

Included in the following conference series:

Abstract

Computational Grids need support the distributed high performance computing with security and reliability. While the fact is when malicious users apply computational resources or illegally modify their secure levels, they can get system-level data or outputs belong to other applications by running cockhorse, even more they can destroy the whole system. For solving these security problems in Grids, a Grid security model with users behaviors and trusts is introduced. And by improving the components of reputation in traditional trust [1], [2] model, a new trust model with mathematical description is presented, and the grid security infrastructure with this trust model is described.

This work was sponsored by the National Science Foundation of China (60273085), the state High-tech Research and Development project (Grid Software) and the ChinaGrid project of China.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Azzedin, F., Maheswaran, M.: Evolving and managing trust in Grid computing systems[C]. In: Canadian Conference on Electrical and Computer Engineering, IEEE CCECE 2002, vol. 3, pp. 1424–1429 (2002)

    Google Scholar 

  2. Abdul-Ranman, A., Hailes, S.: Supporting trust in virtual communities[C]. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, vol. 1, pp. 1–9 (2000)

    Google Scholar 

  3. http://www-unix.globus.org/security/

  4. http://www.cs.virginia.edu/~legion/

  5. Xie, B., Gui, X.-L., Wang, Q.-J.: Study on a Secure Access Model for the Grid Catalogue. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 891–898. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Johner, H., Brown, L., Hinner, F., et al.: Understanding LDAP, International Technical Support Organization (June 1998)

    Google Scholar 

  7. Casanova, N., Dongarra, H.: Enabled Solvers for Scientific computing Using the NetSolve System. In: 3rd International Conference on Algorithms and Arichitectures for Parrallel Processing, pp. 17–33 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gui, X., Xie, B., Li, Y., Qian, D. (2004). A Grid Security Infrastructure Based on Behaviors and Trusts. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds) Grid and Cooperative Computing - GCC 2004 Workshops. GCC 2004. Lecture Notes in Computer Science, vol 3252. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30207-0_60

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30207-0_60

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23578-1

  • Online ISBN: 978-3-540-30207-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics