A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
The Grid 2: Blueprint for a New Computing Infrastructure
The Grid 2: Blueprint for a New Computing Infrastructure
User's Guide To Cryptography And Standards (Artech House Computer Security)
User's Guide To Cryptography And Standards (Artech House Computer Security)
Property-based attestation for computing platforms: caring about properties, not mechanisms
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
A survey of data provenance in e-science
ACM SIGMOD Record
A taxonomy of scientific workflow systems for grid computing
ACM SIGMOD Record
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
Evaluating Provenance-based Trust for Scientific Workflows
CCGRID '06 Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid
Towards a Secure, Tamper-Proof Grid Platform
CCGRID '06 Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid
Risk-Resilient Heuristics and Genetic Algorithms for Security-Assured Grid Job Scheduling
IEEE Transactions on Computers
Towards an open, trusted digital rights management platform
Proceedings of the ACM workshop on Digital rights management
Workflows for e-Science: Scientific Workflows for Grids
Workflows for e-Science: Scientific Workflows for Grids
Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing)
Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing)
Mobile Agents and the Deus Ex Machina
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 02
Semantic remote attestation: a virtual machine directed approach to trusted computing
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
Information Security Tech. Report
Daonity - Grid security from two levels of virtualization
Information Security Tech. Report
Authorisation in Grid computing
Information Security Tech. Report
Enhancing grid security using trusted virtualization
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Managing application whitelists in trusted distributed systems
Future Generation Computer Systems
Hi-index | 0.00 |
We propose a novel scheme that uses Trusted Computing technology to secure Grid workflows. This scheme allows the selection of trustworthy resource providers based on their platform states. The integrity and confidentiality of workflow jobs are provided using cryptographic keys that can only be accessed when resource provider platforms are in trustworthy states. In addition, platform attestation is used to detect potential workflow execution problems, and the information collected can be used for process provenance.