Information Security Tech. Report
Securing Grid Workflows with Trusted Computing
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
Trustable Remote Verification of Web Services
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Trusted Computing: Security and Applications
Cryptologia
Managing application whitelists in trusted distributed systems
Future Generation Computer Systems
Trusted deployment of virtual execution environment in grid systems
ASIAN'09 Proceedings of the 13th Asian conference on Advances in Computer Science: information Security and Privacy
An abstract model of a trusted platform
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Proceedings of the 21st international conference companion on World Wide Web
Lightweight distributed heterogeneous attested android clouds
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Hi-index | 0.00 |
Security concerns currently deter or prohibit many organisations from leveraging the benefits of the grid. When sensitive data is placed under the control of third-party infrastructure it is difficult to obtain assurances that it will be appropriately protected. We develop a grid platform architecture based on a secure root of trust. This component provides a tamperresistant environment for grid job execution that resists attack even if the host itself is compromised. We use Trusted Computing, a security technology currently being integrated into an increasing number of mainstream PCs, for dynamic trust establishment within the grid. These elements are combined to create a novel and practical solution for the grid malicious host problem, ensuring that data integrity and confidentiality is appropriately protected for jobs that span multiple administrative domains.