Cart (Loading....) | Create Account
Close category search window
 

Message-Based Security Model for Grid Services

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Iranmehr, A. ; Islamic Azad Univ., Shiraz, Iran ; Iranmehr, A. ; Sharifnia, M.

Grid is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations.¿ The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new technical approaches. In particular, one must deal with diverse local mechanisms, support dynamic creation of services, and enable dynamic creation of trust domains. As grid services are adopted and applied widely, as definition of an organizational boundary fade away in support of virtual organizations, as virtual organizations continue to evolve to support intermediaries such as firewalls, load balancers, and messaging hubs, and as awareness of the threats organizations face becomes more well understood, the need for a security model within Grid services grows clear. This paper reflects the challenges and requirements we have identified in a Grid environment. Based on those requirements, the proposed security architecture, by extending and leveraging (rather than replacing) existing security technology and assets, will enable businesses and organizations to more rapidly develop secure, interoperable Grid services. Because of the important role of message in Grid services, we limit our scope to message level security when developing our security model.

Published in:

Computer and Electrical Engineering, 2009. ICCEE '09. Second International Conference on  (Volume:2 )

Date of Conference:

28-30 Dec. 2009

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.