Advertisement

Family Gene Based Grid Trust Model

  • Tiefang Wang
  • Tao Li
  • Xun Gong
  • Jin Yang
  • Xiaoqin Hu
  • Diangang Wang
  • Hui Zhao
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4222)

Abstract

This paper analyzes the deficiencies of current grid trust systems based on PKI (Public Key Infrastructure), ambiguity certificate principal information, and complicated identification process. Inspired by biologic gene technique, we propose a novel grid trust model based on Family Gene (FG) model. The model answers the existing questions in tradition trust model by adopting the technology of family gene. The concepts and formal definitions of Family Gene in the grid trust security domains are given. Then, the mathematical models of Family Gene are established. Our theoretical analysis and experimental results show that the model is a good solution to grid trust domain.

Keywords

Trust Model Gene Role Trust Relationship Grid Resource Trust Identification 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Krauter, R.B.K., Maheswaran, M.: A taxonomy and survey of grid resource management systems software practice and experience 32(2), pp. 135–164 (February 2002)Google Scholar
  2. 2.
    Foster, C.K.I., Tuecke, S.: The anatomy of the grid: Enabling scalable virtual organizations. International Journal of Supercomputer Applications (2001)Google Scholar
  3. 3.
    Chadwick, D.W., Otenko, A., Ball, E.: Role-based Access Control with X.509 Attribute Certificates. IEEE Internet Computing, 62–69 (March-April 2003)Google Scholar
  4. 4.
    Tuecke, S., et al.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile (RFC 3820). IETF Network WG (June 2004), http://www.ietf.org/rfc/rfc3820.txt
  5. 5.
    Woods, G.L., et al.: A mule cloned from fetal cells by nuclear transfer. Science 301, 1063 (2003)CrossRefGoogle Scholar
  6. 6.
    Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)Google Scholar
  7. 7.
    Li, T.: An immune based dynamic intrusion detection model. Chinese Science Bulletin 50, 2650–2657 (2005)MATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Li, T.: An immunity based network security risk estimation. Science in China Ser. F. Information Sciences 48, 557–578 (2005)MATHCrossRefGoogle Scholar
  9. 9.
    Mazda, O.: Improvement of nonviral gene therapy by Epstein-Barr virus (EBV)-based plasmid vectors. Curr. Gene. Ther. 2, 379–392 (2002)CrossRefGoogle Scholar
  10. 10.
    Murshed, M., Buyya, R., Abramson, D.: GridSim: A Grid Simulation Toolkit for Resource Management and Scheduling in Large-Scale Grid Computing Environments. In: Proc. of the 17th IEEE International Symposium on Parallel and Distributed (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Tiefang Wang
    • 1
  • Tao Li
    • 1
  • Xun Gong
    • 1
  • Jin Yang
    • 1
  • Xiaoqin Hu
    • 1
  • Diangang Wang
    • 1
  • Hui Zhao
    • 1
  1. 1.School of Computer ScienceSichuan UniversityChengduChina

Personalised recommendations