Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
A new model of security for metasystems
Future Generation Computer Systems - Special issue on metacomputing
Challenge: integrating mobile wireless devices into the computational grid
Proceedings of the 8th annual international conference on Mobile computing and networking
Globe: A Wide-Area Distributed System
IEEE Concurrency
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
Euro-Par '01 Proceedings of the 7th International Euro-Par Conference Manchester on Parallel Processing
Scheduling in the Grid application development software project
Grid resource management
Towards Certificate-Based Authentication for Future Mobile Communications
Wireless Personal Communications: An International Journal
AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure
ICAS-ICNS '05 Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services
A framework for security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
Federated Identity Management for Grids
ICNS '06 Proceedings of the International conference on Networking and Services
Security in Distributed, Grid, Mobile, and Pervasive Computing
Security in Distributed, Grid, Mobile, and Pervasive Computing
The CRISIS wide area security architecture
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Integrating Security and Software Engineering: Advances and Future Vision
Integrating Security and Software Engineering: Advances and Future Vision
Grid Computing Security: A Taxonomy
IEEE Security and Privacy
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
An Implementation of Role-Base Trust Management Extended with Weights on Mobile Devices
Electronic Notes in Theoretical Computer Science (ENTCS)
Reusable security use cases for mobile grid environments
IWSESS '09 Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application
ER '09 Proceedings of the ER 2009 Workshops (CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS) on Advances in Conceptual Modeling - Challenging Perspectives
Analysis of Secure Mobile Grid Systems: A systematic approach
Information and Software Technology
Fine grained access control with trust and reputation management for globus
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Secure Systems Development with UML
Secure Systems Development with UML
Experiences with writing grid clients for mobile devices
ELeGI'05 Proceedings of the 1st international ELeGI conference on Advanced Technology for Enhanced Learning
Engineering secure future internet services
The future internet
Systematic design of secure Mobile Grid systems
Journal of Network and Computer Applications
Editorial: Recent developments in high performance computing and security: An editorial
Future Generation Computer Systems
DCSP-MC: dependable cloud-based storage platform for mobile computing
International Journal of Networking and Virtual Organisations
Hi-index | 0.00 |
Mobile Grid, is a full inheritor of the Grid with the additional feature that it supports mobile users and resources. Security is an important aspect in Grid based systems, and it is more complex to ensure this in a mobile platform owing to the limitations of resources in these devices. A Grid infrastructure that supports the participation of mobile nodes and incorporates security aspects will thus play a significant role in the development of Grid computing. The idea of developing software through systematic development processes to improve software quality is not new. However, many information systems such as those of Grid Computing are still not developed through methodologies which have been adapted to their most differentiating features. The lack of adequate development methods for this kind of systems in which security is taken into account has encouraged us to build a methodology to develop them, offering a detailed guide for their analysis, design and implementation. It is important to use software V&V techniques, according to IEEE Std. 1012 for Software Verification and Validation, to ensure that a software system meets the operational needs of the user. This ensures that the requirements for the system are correct, complete, and consistent, and that the life-cycle products correctly design and implement system requirements. This paper shows part of a development process that we are elaborating for the construction of information systems based on Grid Computing, which are highly dependent on mobile devices in which security plays a highly important role. In the design activity of the process, we design a security architecture which serves as a reference for any mobile Grid application that we wish to build since this security architecture defines a complete set of security services which will be instantiated depending on the requirements and features found in previous activities of the process. A V&V task is also defined in the design activity to validate and verify both the architecture built and the traceability of the artifacts generated in this activity. In this paper, we will present the service-oriented security architecture for Mobile Grid Systems which considers all possible security services that may be required for any mobile Grid application.