Abstract
Trust flows in two directions in a Grid environment. The first is from the Grid user to the Grid resource, that is, the Grid trusts that the user will protect confidential information. The second is from the resource to the user, that is, the Grid willpprotect the user’s Grid job and associated data. This paper comments on how Trusted Computing technology can be used to establish trust in both directions, in three types of Grids that may be interest of to commercial organisations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. Chadwick, A. Otenko, and E. Ball. Role-based access control with x.509 attribute certificates. IEEE Internet Computing, 7(2):62–69, March 2003.
A. Cooper and A. Martin. Towards a secure, tamper-proof grid platform. In Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid, Singapore, May 2006, pages 373–380. IEEE Press, May 2006.
T. Dierks and C. Allen. The TLS Protocol Version 1.0 RFC 2246, Internet and Engineering Task Force, January 1999.
T. Doyle. Meeting the particle physics computing challenge. PSCA International Public Service Review: Trade and Industry, (8):88–89, Autumn 2005.
Enterprise Grid Alliance. Accelerating the adopotion of Grid solutions in the enterprise. White paper, Enterprise Grid Alliance, 2004.
I. Foster and C. Kesselman. The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers, San Francisco, 2nd edition, 2004.
E. M. Gallery and A. Tomlinson. Secure delivery of conditional access applications to mobile receivers, volume 6 of IEE Professional Applications of Computing, chapter 7, page 195–237, IEE Press, London, 1st edition, 2005
D. Grawrock. The Intel safer computing initiative: Building blocks for Trusted Computing. Intel Press, 2006.
W. Mao, A. Martin, H. Jin, and H. Zhang. Innovations for grid security from trusted computing — protocol solutions to sharing of security resource. In Proceedings of the 14th International Workshop on Security Protocols, Cambridge, UK, March 2006, to appear. Springer-Verlag LNCS, March 2006.
W. Mao, F. Yan, and C. Chen. Daonity — Grid security with behaviour conformity from trusted computing. In Proceedings of the first ACM workshop on Scalable Trusted Computing, Alexandria, Virginia US, pages 43–46. ACM Press, Nov 2006.
C. J. Mitchell. Trusted Computing, volume 6 of IEE Professional Applications of Computing. IEE Press, London, 1st edition, 2005. Oasis Standards. WS-Trust 1.3, March 2007.
Thompson and Olson et al. CA-based Trust Model for Grid Authentication and Identity Delegation. Open Grid Forum, Oct 2002.
Trusted Computing Group. TCG Trusted Network Connect TNC Architecture for Interoperability Specification Version 1.1 Revision 2, May 2005.
Trusted Computing Group. TPM Main Part 1 Design Principles Specification Version 1.2 Revision 94, March 2006.
S. Tuecke et al. Internet, X.509 public key infrastructure (PKI) proxy certificate profile. RFC 3820, Internet and Engineering Task Force, June 2004.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag London Limited
About this paper
Cite this paper
Yau, PW., Tomlinson, A. (2007). Using Trusted Computing in Commercial Grids. In: Akhgar, B. (eds) ICCS 2007. Springer, London. https://doi.org/10.1007/978-1-84628-992-7_5
Download citation
DOI: https://doi.org/10.1007/978-1-84628-992-7_5
Publisher Name: Springer, London
Print ISBN: 978-1-84628-990-3
Online ISBN: 978-1-84628-992-7
eBook Packages: Computer ScienceComputer Science (R0)