期刊文献+

An Improved Grid Security Infrastructure by Trusted Computing 被引量:3

An Improved Grid Security Infrastructure by Trusted Computing
下载PDF
导出
摘要 Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment. Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1805-1808,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (60373087 ,60473023 and 90104005) HP Labo-ratories of China
关键词 trusted computing grid computing grid security trusted platform module trusted computing grid computing grid security trusted platform module
  • 相关文献

参考文献10

  • 1Foster I,Kessel man C,Tsudik G,et al.ASecurity Architecture for Computational Grids[].The Fifth ACM Conference on Computers and Commu-nications Security.1998
  • 2Novotny J,Tuecke S,Welch V."An Online Credential Repository for the Grid:MyProxy,"[].Proc th IEEE Symp On High Performance Distributed Computing.2001
  • 3Department of defense standard.The rainbow books.. http://www.fas.org/irp/nsa/rainbow/std001.htm . 2006
  • 4J.Marchesini,S.W.Smith.SHEMP:Secure Hardware Enhanced MyProxy[].Proceedings of Third Annual Conference on PrivacySe-curity and Trust.2005
  • 5Lorch,M,Basney,J,Kafura,D. A Hardware-Secured Credential Repository for Grid PKIs [C]//Proc of 4th IEEE/ACM International Symposium on Cluster Computing and the Grid . 2004
  • 6DYER J,LI NDEMANN M,PEREZ R,et al.Building theIBM4758 secure coprocessor[].IEEE Computer.2001
  • 7Pearlman,L,Welch,V,Foster,I. A Community Authorization Service for Group Collaboration[C] //Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks . 2002
  • 8TCG Specification, Architecture Overview, Spec Revision 1. 2 . 2004
  • 9Humphrey M,Thompson M,Jackson K R.Security for Grids[].Proc of the IEEE.2005
  • 10Mao W.Daonity Specification Part I :Design. http://forge.gridforum.org/ project/tc-rg . 2006

同被引文献37

引证文献3

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部