Skip to main content

Using Trusted Computing in Commercial Grids

  • Conference paper
ICCS 2007

Abstract

Trust flows in two directions in a Grid environment. The first is from the Grid user to the Grid resource, that is, the Grid trusts that the user will protect confidential information. The second is from the resource to the user, that is, the Grid willpprotect the user’s Grid job and associated data. This paper comments on how Trusted Computing technology can be used to establish trust in both directions, in three types of Grids that may be interest of to commercial organisations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • D. Chadwick, A. Otenko, and E. Ball. Role-based access control with x.509 attribute certificates. IEEE Internet Computing, 7(2):62–69, March 2003.

    Article  Google Scholar 

  • A. Cooper and A. Martin. Towards a secure, tamper-proof grid platform. In Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid, Singapore, May 2006, pages 373–380. IEEE Press, May 2006.

    Google Scholar 

  • T. Dierks and C. Allen. The TLS Protocol Version 1.0 RFC 2246, Internet and Engineering Task Force, January 1999.

    Google Scholar 

  • T. Doyle. Meeting the particle physics computing challenge. PSCA International Public Service Review: Trade and Industry, (8):88–89, Autumn 2005.

    Google Scholar 

  • Enterprise Grid Alliance. Accelerating the adopotion of Grid solutions in the enterprise. White paper, Enterprise Grid Alliance, 2004.

    Google Scholar 

  • I. Foster and C. Kesselman. The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers, San Francisco, 2nd edition, 2004.

    Google Scholar 

  • E. M. Gallery and A. Tomlinson. Secure delivery of conditional access applications to mobile receivers, volume 6 of IEE Professional Applications of Computing, chapter 7, page 195–237, IEE Press, London, 1st edition, 2005

    Google Scholar 

  • D. Grawrock. The Intel safer computing initiative: Building blocks for Trusted Computing. Intel Press, 2006.

    Google Scholar 

  • W. Mao, A. Martin, H. Jin, and H. Zhang. Innovations for grid security from trusted computing — protocol solutions to sharing of security resource. In Proceedings of the 14th International Workshop on Security Protocols, Cambridge, UK, March 2006, to appear. Springer-Verlag LNCS, March 2006.

    Google Scholar 

  • W. Mao, F. Yan, and C. Chen. Daonity — Grid security with behaviour conformity from trusted computing. In Proceedings of the first ACM workshop on Scalable Trusted Computing, Alexandria, Virginia US, pages 43–46. ACM Press, Nov 2006.

    Google Scholar 

  • C. J. Mitchell. Trusted Computing, volume 6 of IEE Professional Applications of Computing. IEE Press, London, 1st edition, 2005. Oasis Standards. WS-Trust 1.3, March 2007.

    Google Scholar 

  • Thompson and Olson et al. CA-based Trust Model for Grid Authentication and Identity Delegation. Open Grid Forum, Oct 2002.

    Google Scholar 

  • Trusted Computing Group. TCG Trusted Network Connect TNC Architecture for Interoperability Specification Version 1.1 Revision 2, May 2005.

    Google Scholar 

  • Trusted Computing Group. TPM Main Part 1 Design Principles Specification Version 1.2 Revision 94, March 2006.

    Google Scholar 

  • S. Tuecke et al. Internet, X.509 public key infrastructure (PKI) proxy certificate profile. RFC 3820, Internet and Engineering Task Force, June 2004.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag London Limited

About this paper

Cite this paper

Yau, PW., Tomlinson, A. (2007). Using Trusted Computing in Commercial Grids. In: Akhgar, B. (eds) ICCS 2007. Springer, London. https://doi.org/10.1007/978-1-84628-992-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-84628-992-7_5

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-990-3

  • Online ISBN: 978-1-84628-992-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics