An Improved Grid Security Infrastructure by Trusted Computing

被引:2
|
作者
YAN Fei~ 1
2. College of Computer Science and Technology
机构
关键词
trusted computing; grid computing; grid security; trusted platform module;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Current delegation mechanism of grid security infrastructure (GSI) can’t satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment.
引用
收藏
页码:1805 / 1808
页数:4
相关论文
共 50 条
  • [1] An improved wireless grid security infrastructure based on trusted computing technology
    Yan, Fei
    Zhang, Huanguo
    Shen, Zhidong
    Zhang, Liqiang
    Qiang, Weizhong
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1186 - +
  • [2] DHT-based security infrastructure for trusted internet and grid computing
    Hwang, Kai
    Cai, Min
    Kwok, Yu-Kwong
    Song, Shanshan
    Chen, Yu
    Chen, Ying
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (04) : 412 - 433
  • [3] Decentralized Trusted Computing Base for Blockchain Infrastructure Security
    Hardjono, Thomas
    Smith, Ned
    [J]. FRONTIERS IN BLOCKCHAIN, 2019, 2
  • [4] Trusted Grid computing with security binding and trust integration
    Song S.
    Hwang K.
    Kwok Y.-K.
    [J]. Journal of Grid Computing, 2005, 3 (1-2) : 53 - 73
  • [5] Trusted grid computing with security assurance and resource optimization
    Song, S
    Hwang, K
    [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 110 - 117
  • [6] Daonity: An experience on enhancing grid security by trusted computing technology
    Yan, Fei
    Qiang, Weizhong
    Shen, Zhidong
    Chen, Chunrun
    Zhang, Huanguo
    Zou, Deqing
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 227 - 235
  • [7] Security Access of Power terminal on Trusted Computing in Smart Grid
    Deng Song
    Lin Wei-min
    Zhang Tao
    Ma Yuan-yuan
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2659 - 2664
  • [8] Innovations for Grid Security from Trusted Computing Protocol Solutions to Sharing of Security Resource
    Mao, Wenbo
    Martin, Andrew
    Jin, Hai
    Zhang, Huanguo
    [J]. SECURITY PROTOCOLS, 2009, 5087 : 132 - +
  • [9] Trusted Logging for Grid Computing
    Huh, Jun Ho
    Martin, Andrew
    [J]. APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 30 - 42
  • [10] Mobile Security and Trusted Computing
    Mitchell, Chris
    [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326