File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1002/cpe.1035
- Scopus: eid_2-s2.0-33750860430
- WOS: WOS:000242113300012
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: G-PASS: An instance-oriented security infrastructure for Grid travelers
Title | G-PASS: An instance-oriented security infrastructure for Grid travelers |
---|---|
Authors | |
Keywords | Delegation Mobile agent Process migration Security Trust |
Issue Date | 2006 |
Publisher | John Wiley & Sons Ltd. The Journal's web site is located at http://www.interscience.wiley.com/jpages/1532-0626/ |
Citation | Concurrency Computation Practice And Experience, 2006, v. 18 n. 14, p. 1871-1884 How to Cite? |
Abstract | Grid computing unifies distributed resources via its support for the creation and use of virtual organizations (VOs), where a VO represents a collection of distributed resources to be accessed through predefined resource sharing and coordination policies. We consider a special type of mobile processes, named Grid travelers, which can travel across boundaries of VOs for the detection of resource availability, to negotiate for the approval of access privileges and to conduct remote execution. A new security infrastructure named G-PASS is proposed to guarantee the validity and integrity of the travelers and the critical security knowledge they collect while traveling, especially while crossing some VOs. G-PASS borrows the idea of passport and custom, as well as the procedures for people's travel in real life, to provide role-based delegation mapping and access control. We demonstrate the power and feasibility of G-PASS with a simulated mobile agent environment and a distributed ray-tracing application running on multiple VOs. Various security overheads coming from migration decisions and actual agent or process migration are reported. G-PASS can be installed with Grid Security Infrastructure (GSI) as the base, which makes it compatible with the existing Grid middleware. Copyright © 2006 John Wiley & Sons, Ltd. |
Persistent Identifier | http://hdl.handle.net/10722/89118 |
ISSN | 2023 Impact Factor: 1.5 2023 SCImago Journal Rankings: 0.533 |
ISI Accession Number ID | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ma, T | en_HK |
dc.contributor.author | Chen, L | en_HK |
dc.contributor.author | Wang, CL | en_HK |
dc.contributor.author | Lau, FCM | en_HK |
dc.date.accessioned | 2010-09-06T09:52:37Z | - |
dc.date.available | 2010-09-06T09:52:37Z | - |
dc.date.issued | 2006 | en_HK |
dc.identifier.citation | Concurrency Computation Practice And Experience, 2006, v. 18 n. 14, p. 1871-1884 | en_HK |
dc.identifier.issn | 1532-0626 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/89118 | - |
dc.description.abstract | Grid computing unifies distributed resources via its support for the creation and use of virtual organizations (VOs), where a VO represents a collection of distributed resources to be accessed through predefined resource sharing and coordination policies. We consider a special type of mobile processes, named Grid travelers, which can travel across boundaries of VOs for the detection of resource availability, to negotiate for the approval of access privileges and to conduct remote execution. A new security infrastructure named G-PASS is proposed to guarantee the validity and integrity of the travelers and the critical security knowledge they collect while traveling, especially while crossing some VOs. G-PASS borrows the idea of passport and custom, as well as the procedures for people's travel in real life, to provide role-based delegation mapping and access control. We demonstrate the power and feasibility of G-PASS with a simulated mobile agent environment and a distributed ray-tracing application running on multiple VOs. Various security overheads coming from migration decisions and actual agent or process migration are reported. G-PASS can be installed with Grid Security Infrastructure (GSI) as the base, which makes it compatible with the existing Grid middleware. Copyright © 2006 John Wiley & Sons, Ltd. | en_HK |
dc.language | eng | en_HK |
dc.publisher | John Wiley & Sons Ltd. The Journal's web site is located at http://www.interscience.wiley.com/jpages/1532-0626/ | en_HK |
dc.relation.ispartof | Concurrency Computation Practice and Experience | en_HK |
dc.rights | Concurrency and Computation: Practice & Experience. Copyright © John Wiley & Sons Ltd. | en_HK |
dc.subject | Delegation | en_HK |
dc.subject | Mobile agent | en_HK |
dc.subject | Process migration | en_HK |
dc.subject | Security | en_HK |
dc.subject | Trust | en_HK |
dc.title | G-PASS: An instance-oriented security infrastructure for Grid travelers | en_HK |
dc.type | Article | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=1532-0626&volume=18&spage=1871&epage=1884&date=2006&atitle=G-PASS:+An+Instance-oriented+Security+Infrastructure+for+Grid+Travelers | en_HK |
dc.identifier.email | Wang, CL:clwang@cs.hku.hk | en_HK |
dc.identifier.email | Lau, FCM:fcmlau@cs.hku.hk | en_HK |
dc.identifier.authority | Wang, CL=rp00183 | en_HK |
dc.identifier.authority | Lau, FCM=rp00221 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1002/cpe.1035 | en_HK |
dc.identifier.scopus | eid_2-s2.0-33750860430 | en_HK |
dc.identifier.hkuros | 138643 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-33750860430&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 18 | en_HK |
dc.identifier.issue | 14 | en_HK |
dc.identifier.spage | 1871 | en_HK |
dc.identifier.epage | 1884 | en_HK |
dc.identifier.isi | WOS:000242113300012 | - |
dc.publisher.place | United Kingdom | en_HK |
dc.identifier.scopusauthorid | Ma, T=7402783937 | en_HK |
dc.identifier.scopusauthorid | Chen, L=22333674600 | en_HK |
dc.identifier.scopusauthorid | Wang, CL=7501646188 | en_HK |
dc.identifier.scopusauthorid | Lau, FCM=7102749723 | en_HK |
dc.identifier.issnl | 1532-0626 | - |