A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A Case For Grid Computing On Virtual Machines
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
An Online Credential Repository for the Grid: MyProxy
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
Attestation-based policy enforcement for remote access
Proceedings of the 11th ACM conference on Computer and communications security
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Property-based attestation for computing platforms: caring about properties, not mechanisms
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Towards a Secure, Tamper-Proof Grid Platform
CCGRID '06 Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid
Trust[ed | in] computing, signed code and the heat death of the internet
Proceedings of the 2006 ACM symposium on Applied computing
A comparison of software and hardware techniques for x86 virtualization
Proceedings of the 12th international conference on Architectural support for programming languages and operating systems
A protocol for property-based attestation
Proceedings of the first ACM workshop on Scalable trusted computing
Daonity: grid security with behaviour conformity from trusted computing
Proceedings of the first ACM workshop on Scalable trusted computing
ShibGrid: Shibboleth Access for the UK National Grid Service
E-SCIENCE '06 Proceedings of the Second IEEE International Conference on e-Science and Grid Computing
Daonity - Grid security from two levels of virtualization
Information Security Tech. Report
Trust management for trusted computing platforms in web services
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Secure web service federation management using tpm virtualisation
Proceedings of the 2007 ACM workshop on Secure web services
Towards Trust Services for Language-Based Virtual Machines for Grid Computing
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Trusted Computing Serving an Anonymity Service
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Building Trusted Sub-domain for the Grid with Trusted Computing
Information Security and Cryptology
Securing Grid Workflows with Trusted Computing
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
Integrating Formal Analysis and Design to Preserve Security Properties
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
A Secure Information Flow Architecture for Web Service Platforms
IEEE Transactions on Services Computing
Integrity Management Infrastructure for Trusted Computing
IEICE - Transactions on Information and Systems
Trustworthy Log Reconciliation for Distributed Virtual Organisations
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Grid Technology for Maximizing Collaborative Decision Management and Support: Advancing Effective Virtual Organizations
Trust maintenance toward virtual computing environment in the grid service
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Daonity: an experience on enhancing grid security by trusted computing technology
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
An approach to a trustworthy system architecture using virtualization
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Editorial: Special Section: Trusted computing
Future Generation Computer Systems
Verifying trustworthiness of virtual appliances in collaborative environments
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
A comprehensive vulnerability based alert management approach for large networks
Future Generation Computer Systems
Hi-index | 0.00 |
Many distributed batch systems, such as computational grids, require a level of integrity protection to guarantee the proper execution of a job or workflow. One way of achieving this, implicit in many trusted computing proposals, is to use application whitelisting to prevent unknown and untrusted applications from being executed on remote services. However, this approach has significant shortcomings across multiple administrative domains, as conflicts between locally managed whitelists will result in many useful services appearing untrustworthy to users. This has the potential to limit availability and prevent trusted distributed systems from ever being successfully deployed. We propose a set of requirements for a system which will manage these conflicts, and provide a mechanism for updating application whitelists that will increase service availability and trustworthiness. We also suggest and specify a set of components, including a centralised configuration manager, which will meet these requirements.