The grid: blueprint for a new computing infrastructure
The grid: blueprint for a new computing infrastructure
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 10th ACM conference on Computer and communications security
Queue - Surviving Network Attacks
A Simple Framework for Distributed Forensics
ICDCSW '05 Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02
Standardizing the Construction of a Digital Forensics Laboratory
SADFE '05 Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering on Systematic Approaches to Digital Forensic Engineering
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Security requirements model for grid data management systems
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
File and memory security analysis for grid systems
HPCC'07 Proceedings of the Third international conference on High Performance Computing and Communications
Hi-index | 0.00 |
Along with the evolution of Grid technology, the need to protect its resources from malicious activities is becoming more and more important. While robust security architecture provides deterrence, there never be a perfect security mechanism. The Grid security teams must be able to tackle the postattack situation and should be able to read the black-box of the events that led to the failure of the security architecture. Moreover, they should be able to collect the fingerprints of the culprits behind the attack so that necessary legal and judicial actions could be taken. It is only possible when the specific nature of the Grid is kept in mind while developing its forensics techniques. Grid is anewer paradigm and still lacks a number of security features. There is no other work in our knowledge that addresses forensics issues of the grid. This vacuum has overwhelmingly motivated us to take some initiative to fill this gap.