The quadratic sieve factoring algorithm
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Java security: hostile applets, holes&antidotes
Java security: hostile applets, holes&antidotes
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
IEEE Internet Computing
IEEE Internet Computing
Scalable Service Deployment Using Mobile Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Interactive and Descriptor-Based Deployment of Object-Oriented Grid Applications
HPDC '02 Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A Flexible Security Model For Using Internet Content
SRDS '97 Proceedings of the 16th Symposium on Reliable Distributed Systems
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Upgrading transport protocols using untrusted mobile code
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Model-carrying code: a practical approach for safe execution of untrusted applications
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
DisCo: Middleware for Securely Deploying Decomposable Services in Partly Trusted Environments
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
The Grid 2: Blueprint for a New Computing Infrastructure
The Grid 2: Blueprint for a New Computing Infrastructure
Distributed Ant: A System to Support Application Deployment in the Grid
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
Hot service deployment in an ad hoc grid environment
Proceedings of the 2nd international conference on Service oriented computing
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
RCT: A distributed tree for supporting efficient range and multi-attribute queries in grid computing
Future Generation Computer Systems
A negotiation-based trust establishment service for CROWN grid
International Journal of Autonomous and Adaptive Communications Systems
PIVOT: An adaptive information discovery framework for computational grids
Information Sciences: an International Journal
Modeling and negotiating service quality
Service research challenges and solutions for the future internet
Hi-index | 0.00 |
The main goal of our key project, the CROWN Grid, is to empower in-depth integration of resources and the cooperation of researchers nationwide and worldwide. CROWN exploits a service-oriented architecture based on OGSA. In CROWN, remote service deployment is highly desirable. To the best of our knowledge, however, there is no successful solution to ensure the enabling remote and hot service deployment in grid systems. Traditionally, remote deployment is supported in a cold fashion, which results in many disadvantages, such as low efficiency. Moreover, since the deployer and the target container may be in different domains, great security challenges arise when a service is deployed to a remote container. In this paper, we present ROST, an original scheme of Remote and hOt Service deployment with Trustworthiness. By dynamically updating runtime environment configurations, ROST avoids restarting the runtime system during deployment. In addition, we include trust negotiation in ROST, which greatly increases the flexibility and security of the CROWN Grid. ROST has been successfully implemented. We conduct comprehensive experiments with real applications, and the results show that ROST is viable and significantly improves the service efficiency and quality of CROWN. We believe that the wide deployment of ROST would also benefit other grid systems.