Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
The unified software development process
The unified software development process
A new model of security for metasystems
Future Generation Computer Systems - Special issue on metacomputing
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Globe: A Wide-Area Distributed System
IEEE Concurrency
Model driven security for process-oriented systems
Proceedings of the eighth ACM symposium on Access control models and technologies
HPDC '03 Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing
Scheduling in the Grid application development software project
Grid resource management
Bringing security home: a process for developing secure and usable systems
Proceedings of the 2003 workshop on New security paradigms
The Grid 2: Blueprint for a New Computing Infrastructure
The Grid 2: Blueprint for a New Computing Infrastructure
Mobile OGSI.NET: Grid Computing on Mobile Devices
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure
ICAS-ICNS '05 Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services
A Scalable Security Architecture for Grid
PDCAT '05 Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
Model driven security: From UML models to access control infrastructures
ACM Transactions on Software Engineering and Methodology (TOSEM)
A Grid Service Infrastructure for Mobile Devices
SKG '05 Proceedings of the First International Conference on Semantics, Knowledge and Grid
PWSSec: Process for Web Services Security
ICWS '06 Proceedings of the IEEE International Conference on Web Services
The Handbook of Mobile Middleware
The Handbook of Mobile Middleware
Grid-M: Middleware to Integrate Mobile Devices, Sensors and Grid Computing
ICWMC '07 Proceedings of the Third International Conference on Wireless and Mobile Communications
The CRISIS wide area security architecture
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Integrating Security and Software Engineering: Advances and Future Vision
Integrating Security and Software Engineering: Advances and Future Vision
Enterprise Modeling for Information System Development within MDA
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
Model-based security analysis for mobile communications
Proceedings of the 30th international conference on Software engineering
PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Security Patterns and Secure Systems Design
LADC '07 Proceedings of the 3rd Latin-American symposium on Dependable Computing
Securing Next-Generation Grids
IT Professional
Editorial: Model-Driven Development for secure information systems
Information and Software Technology
On building secure SCADA systems using security patterns
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Development of Applications Based on Security Patterns
DEPEND '09 Proceedings of the 2009 Second International Conference on Dependability
Reusable security use cases for mobile grid environments
IWSESS '09 Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application
ER '09 Proceedings of the ER 2009 Workshops (CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS) on Advances in Conceptual Modeling - Challenging Perspectives
A Taxonomy of Model Transformation
Electronic Notes in Theoretical Computer Science (ENTCS)
Analysis of Secure Mobile Grid Systems: A systematic approach
Information and Software Technology
Security services architecture for Secure Mobile Grid Systems
Journal of Systems Architecture: the EUROMICRO Journal
Mobile-to-grid middleware: an approach for breaching the divide between mobile and grid environments
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Automatic translation form requirements model into use cases modeling on UML
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Mobile-to-Grid middleware: bridging the gap between mobile and grid environments
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Hi-index | 0.00 |
Grid computing has arisen as an evolution of distributed systems mainly focused on the sharing of and remote access to resources in a uniform, transparent, secure, efficient and reliable manner. It is possible to join Grid technology and mobile technology in order to create one of the most promising technologies and developments to appear in recent years, in that they enrich one another and provide new solutions that solve many of the limitations and problems found in different technologies. Security is a very important factor in Mobile Grid Computing and is also difficult to achieve owing to the open nature of wireless networks and heterogeneous and distributed environments. Success in obtaining a secure system originates in incorporating security from the first stages of the development process. It has therefore been necessary to define a development process for this kind of systems in which security is incorporated in all stages of the development and the features and particularities of the Mobile Grid systems are taken into consideration. This paper presents one of the activities of this development process, the design activity, which consists of defining and designing a security software architecture. This architecture will be built from a security architecture, defined as reference architecture, in which security services, interfaces and operations are defined with the purpose of defining a reference security architecture which covers the majority of security requirements identified in the analysis activity. The design activity will build the system architecture that will be the input artefact for the subsequent activity in the process, which is the construction activity.