By Topic

Trusted Computing Enabled Access Control for Virtual Organizations

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jing Zhan ; Wuhan Univ., Wuhan ; Huanguo Zhang

Grid computing is becoming the prominent paradigm for resource exchange and collaboration, which are supported by dynamic, multi-institutional virtual organizations (VOs) overcoming limitations of time or space. As the de-facto standard for grid security, grid security infrastructure provides no effective mechanism to protect both resource providers and users from access of malicious entities. The trusted computing (TC) technology adopted by the trusted computing group (TCG) defines that an entity can be trusted as long as it always behaves in the expected manner. Specifically, the TC uses a hardware module called trusted platform module (TPM) to ensure the tamper-proof attestative behavior by integrity measurement, logging and report. In this paper, we propose and design a TC enabled system based on Linux and TPM hardware to enforce access control policy for the VO.

Published in:

Computational Intelligence and Security Workshops, 2007. CISW 2007. International Conference on

Date of Conference:

15-19 Dec. 2007