The Legion vision of a worldwide virtual computer
Communications of the ACM
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
The Diesel Combustion Collaboratory: combustion researchers collaborating over the Internet
SC '99 Proceedings of the 1999 ACM/IEEE conference on Supercomputing
Future Generation Computer Systems - Special issue on metacomputing
A Flexible Security System for Metacomputing Environments
HPCN Europe '99 Proceedings of the 7th International Conference on High-Performance Computing and Networking
Grid Information Services for Distributed Resource Sharing
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
Overview of Security Considerations for Computational and Data Grids
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
Security Implications of Typical Grid Computing Usage Scenarios
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
Implications of virtualization on grids for high energy physics applications
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
Proceedings of the 4th symposium on Usable privacy and security
QoS Requirements for a Medical Application on the Grid
Computer Supported Cooperative Work in Design IV
Transparent access to grid-based compute utilities
PPAM'07 Proceedings of the 7th international conference on Parallel processing and applied mathematics
GUTS: a framework for adaptive and configureable grid user trust service
STM'10 Proceedings of the 6th international conference on Security and trust management
SHAPE--an approach for self-healing and self-protection in complex distributed networks
The Journal of Supercomputing
Hi-index | 0.00 |
Grid Computing consists of a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios is presented and analyzed with regard to security requirements such as authentication, authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions is to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios is to increase the awareness of security issues in Grid Computing.