Path independence for authentication in large-scale systems
Proceedings of the 4th ACM conference on Computer and communications security
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
LegionFS: a secure and scalable file system supporting cross-domain high-performance applications
Proceedings of the 2001 ACM/IEEE conference on Supercomputing
Abstracting Process-to-Function Relations in Concurrency Object-Oriented Applications
ECOOP '94 Proceedings of the 8th European Conference on Object-Oriented Programming
A Kernelized Architecture for Multilevel Secure Application Policies
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Secure Component Distribution Using WebCom
SEC '02 Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives
Trust Management and Network Layer Security Protocols
Proceedings of the 7th International Workshop on Security Protocols
Offline Micropayments without Trusted Hardware
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Can We Eliminate Certificate Revocations Lists?
FC '98 Proceedings of the Second International Conference on Financial Cryptography
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Reasoning about Trust and Insurance in a Public Key Infrastructure
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
Social ReGreT, a reputation model based on social relations
ACM SIGecom Exchanges - Chains of commitment
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A System for Ensuring Data Integrity in Grid Environments
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Webcom-G: grid enabled metacomputing
Neural, Parallel & Scientific Computations - Special issue: Grid computing
Security in WebCom: addressing naming issues for a web services architecture
SWS '04 Proceedings of the 2004 workshop on Secure web service
The information gathering module of the WebCom-G operating system
ISPDC'03 Proceedings of the Second international conference on Parallel and distributed computing
Monitoring and Reputation Mechanisms for Service Level Agreements
GECON '08 Proceedings of the 5th international workshop on Grid Economics and Business Models
Hi-index | 0.00 |
Administration of Grid resources is a time consuming and often tedious job. Most administrative requests are predictable, and in general, handling them requires knowledge of the local resources and the requester. In this paper we discuss a system to provide automated support for administrative requests, such as resource reservation and user account management. We propose using trust metrics to help judge the merits and suitability of each request. We outline how these metrics can be implemented using trust management techniques into a practical system we call GridAdmin.