期刊文献+

Trust Asymmetry in Grid Authentication 被引量:1

Trust Asymmetry in Grid Authentication
原文传递
导出
摘要 To tackle trust asymmetry problem in grid authentication (GAu), this paper proposes a novel GAu mechanism to help establish a symmetric trust relationship between resource consumer and resource provider on the grid. To exemplify the designing of the novel GAu mechanism, a prototype is also given with integration of a trust model. Empirical results demonstrate that the proposed model can be a potential solution to address trust asymmetry problem in grid authentication. To tackle trust asymmetry problem in grid authentication (GAu), this paper proposes a novel GAu mechanism to help establish a symmetric trust relationship between resource consumer and resource provider on the grid. To exemplify the designing of the novel GAu mechanism, a prototype is also given with integration of a trust model. Empirical results demonstrate that the proposed model can be a potential solution to address trust asymmetry problem in grid authentication.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期201-204,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National High Technology Research and Development Program of China (863 Program) (2007AA01Z404, 2007AA01Z478) the National Natural Science Foundation of China (60573141, 60773041) the Natural Science Foundation of Jiangsu Province (BK2008451)
关键词 asymmetry AUTHENTICATION GRID TRUST asymmetry authentication grid trust
  • 相关文献

参考文献11

  • 1Foster I, Kesselman C. The Grid: Blueprint for a New Computing Infrastructure [M]. 2nd ed. Singapore: Elsevier, 2004.
  • 2Li P, Cui Y, Tian P, et al. A new architecture of grid security system construction[C]//Proceedings of the 2006 International Conference Workshops on Parallel Processing. Washington D C: IEEE Computer Society, 2006: 100-108.
  • 3Power P D J, Politou P E A, Slaymaker P M A, et al. Towards secure grid-enabled healthcare: Research articles[J]. Software-Practice & Experience, 2005,35 (9): 851-871.
  • 4Dinda P A. Addressing the trust asymmetry problem in grid computing with encrypted computation[C]//Proceedings of the 7th Workshop on Workshop on Languages, Compilers, and Run-time Support for Scalable Systems Table of Contents. New York: ACM Press, 2004: 1-7.
  • 5Zhao Shanyu, Lo V, GAuthier D C. Result verification and trust-based scheduling in peer-to-peer grids [C]//Fifth IEEE International Conference on Peer-to-Peer Computing. Washing.ton D C: IEEE Computer Society, 2005:31- 38.
  • 6Song S, Hwang K, Kwok Y. Trusted grid computing with security binding and trust integration [J]. Journal of Grid Computing, 2005, 3: 53-73.
  • 7Mao W, Yan F, Chen C. Daonity-grid security with behavior conformity from trusted computing[C]//Proceedings of the First ACM Workshop on Scalable Trusted Computing (STC'06). New York: ACM Press, 2006: 43-46.
  • 8Lohr H, Ramasamy H V, Sadeghi A, et al. Enhancing grid security using trusted virtualization[C]//Proc Autonomic and Trusted Computing (LNCS 4610). Heidelberg: Springer-Verlag, 2007: 372-383.
  • 9Winsborough W H, Li N. Towards practical automated trust negotiation[C]//Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks. Washington D C: IEEE Computer Society, 2002: 92-103.
  • 10Ruohomaa, S, Kutvonen L, Koutrouli E. Reputation management survey[C] // Second International Conference on Availability, Reliability and Security (ARES'07). Washington D C: IEEE Computer Society, 2007:103-111.

同被引文献2

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部