The Community for Technology Leaders
RSS Icon
Issue No.01 - January/February (2008 vol.6)
pp: 44-51
Anirban Chakrabarti , Infosys Technologies
Anish Damodaran , Infosys Technologies
Shubhashis Sengupta , Infosys Technologies
Grid computing helps us overcome heterogeneity in terms of computing elements, operating systems, policy decisions, and environments. However, security issues impede us from adopting the grid as a widespread IT virtualization solution, so we must develop solutions to address these issues.
grid computing, grid security, Grid, Security, Sandboxing, Virtualization, Authorization, GSI, Certificates, Denial-of-Service, Credentials
Anirban Chakrabarti, Anish Damodaran, Shubhashis Sengupta, "Grid Computing Security: A Taxonomy", IEEE Security & Privacy, vol.6, no. 1, pp. 44-51, January/February 2008, doi:10.1109/MSP.2008.12
1. I. Foster and C. Kasselman, The Grid 2: Blueprint for a New Computing Infrastructure, Morgan Kaufmann, 2004.
2. G.C. Necula and P. Lee, "Research on Proof-Carrying Code for Untrusted-Code Security," Proc. IEEE Symp. Security and Privacy (SSP), IEEE CS Press, 1997, p. 204.
3. P. Barham et al., "Xen and the Art of Virtualization," ACM Symp. Operating System Principles (SOSP), ACM Press, 2003, pp. 164–177.
4. R. Uhlig et al., "Intel Virtualization Technology," Computer, vol. 38, no. 5, 2005, pp. 48–56.
5. A. Berman, V. Bourassa, and E. Selberg, "TRON: Process-Specific File Protection for the UNIX Operating System," Proc. Usenix Technical Conf. UNIX and Advanced Computing Systems, Usenix, 1995, pp. 14–24.
6. GGF document, "Advanced Reservation: State of the Art," ggf-draft-sched-graap-2.0, June 2003.
7. V. Welch et al., "Security for Grid Services," Proc. IEEE Int'l Symp. High Performance Distributed Computing, IEEE CS Press, 2003, pp. 48–57.
8. A. Nadalin et al., Web Services Security: SOAP Message Security 1.1, OASIS standard specification, Feb. 2006; 16790wss-v1.1-spec-os-SOAPMessageSecurity.pdf .
9. S. Anderson et al., Web Services Secure Conversation Language (WS-SecureConversation)," OASIS specification, May 2005.
10. C. Adams and S. Farrell, "Internet X.509 Public Key Infrastructure," IETF RFC 2510, Mar. 1999;
11. E. Maler, Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML), OASIS standard, Nov. 2002; 3406oasis-sstc-saml-core-1.1.pdf.
12. T. Moses, ed., eXtensible Access Control Markup Language (XACML) Version 2.0, OASIS standard; .
13. S.S. Mudumbai et al., "Design and Implementation Issues for Distributed Access Control," Proc. 14th Ann. Computer Security and Applications Conf. (ACSAC), IEEE CS Press, 1998; .
14. I. Foster et al., "Community Authorization Service: Status and Future," Proc. Comping in High Energy Physics (CHEP), Mar. 2003; CAS_update_CHEP_03-final.pdf.
15. R. Alfieri et al., "From Gridmap-File to VOMS: Managing Authorization in a Grid Environment," Future Generation Computer Systems, vol. 21, no. 4, 2005, pp. 549–558.
16. S. Kenny and B. Coghlan, "Towards a Grid-Wide Intrusion Detection System," Proc. European Grid Conference (EGC), Springer, 2005, pp. 275–284.
17. A. Chakrabarti and G. Manimaran, "Internet Infrastructure Security: A Taxonomy," IEEE Networks, vol. 16, no. 6, 2002, pp. 13–21.
18. J. Basney, M. Humphrey, and V. Welch, "The MyProxy Online Credential Repository," Software—Practice &Experience, vol. 35, no. 9, 2005, pp. 801–816.
19. V. Welch et al., "Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration," Proc. 4th Ann. PKI R&D Workshop, 2005; welch-globus-shibboleth.pdf.
20. A. Chakrabarti, Grid Computing Security, Springer-Verlag, 2007.
32 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool