Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Signature schemes based on the strong RSA assumption
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
On the (Im)possibility of Obfuscating Programs
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
IPDPS '03 Proceedings of the 17th International Symposium on Parallel and Distributed Processing
IRM Enforcement of Java Stack Inspection
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Daonity: grid security with behaviour conformity from trusted computing
Proceedings of the first ACM workshop on Scalable trusted computing
Run-Time Enforcement of Nonsafety Policies
ACM Transactions on Information and System Security (TISSEC)
Innovations for Grid Security from Trusted Computing
Security Protocols
GMPLS-based service differentiation for scalable QoS support in all-optical Grid applications
Future Generation Computer Systems - Collaborative and learning applications of grid technology
Detecting misbehaving units on computational grids
Concurrency and Computation: Practice & Experience - Advanced Scheduling Strategies and Grid Programming Environments
Collision free hash functions and public key signature schemes
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Secure hash-and-sign signatures without the random oracle
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A format-independent architecture for run-time integrity checking of executable code
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
An Extensible Framework for Efficient Secure SMS
CISIS '10 Proceedings of the 2010 International Conference on Complex, Intelligent and Software Intensive Systems
Towards a federated Metropolitan Area Grid environment: The SCoPE network-aware infrastructure
Future Generation Computer Systems
On Trustworthiness of CPU Usage Metering and Accounting
ICDCSW '10 Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops
GIVS: integrity validation for grid security
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part III
Enhancing grid security using trusted virtualization
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
Grid computing is a distributed environment in which a remote service is provided by a resource owner to a client by means of a grid infrastructure. One of the major expectations for grid computing is about the rising of a market where users pay to access the computational and storage capacity offered by a resource owner. In this scenario, all the steps of the economic transaction related to the fulfilment of a service are accomplished with the mediation of the grid infrastructure. Several economic models have been proposed for determining how to charge the services offered through a grid. In this paper, we outline one important security issue that may arise in models where services are priced according to the amount of resources they consume. Our contribution is to propose a new security model where secure grid transactions are possible even when resource owners and clients are corrupted.