Skip to main content

Family Gene Based Grid Trust Model

  • Conference paper
Advances in Natural Computation (ICNC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4222))

Included in the following conference series:

  • 911 Accesses

Abstract

This paper analyzes the deficiencies of current grid trust systems based on PKI (Public Key Infrastructure), ambiguity certificate principal information, and complicated identification process. Inspired by biologic gene technique, we propose a novel grid trust model based on Family Gene (FG) model. The model answers the existing questions in tradition trust model by adopting the technology of family gene. The concepts and formal definitions of Family Gene in the grid trust security domains are given. Then, the mathematical models of Family Gene are established. Our theoretical analysis and experimental results show that the model is a good solution to grid trust domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Krauter, R.B.K., Maheswaran, M.: A taxonomy and survey of grid resource management systems software practice and experience 32(2), pp. 135–164 (February 2002)

    Google Scholar 

  2. Foster, C.K.I., Tuecke, S.: The anatomy of the grid: Enabling scalable virtual organizations. International Journal of Supercomputer Applications (2001)

    Google Scholar 

  3. Chadwick, D.W., Otenko, A., Ball, E.: Role-based Access Control with X.509 Attribute Certificates. IEEE Internet Computing, 62–69 (March-April 2003)

    Google Scholar 

  4. Tuecke, S., et al.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile (RFC 3820). IETF Network WG (June 2004), http://www.ietf.org/rfc/rfc3820.txt

  5. Woods, G.L., et al.: A mule cloned from fetal cells by nuclear transfer. Science 301, 1063 (2003)

    Article  Google Scholar 

  6. Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)

    Google Scholar 

  7. Li, T.: An immune based dynamic intrusion detection model. Chinese Science Bulletin 50, 2650–2657 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  8. Li, T.: An immunity based network security risk estimation. Science in China Ser. F. Information Sciences 48, 557–578 (2005)

    Article  MATH  Google Scholar 

  9. Mazda, O.: Improvement of nonviral gene therapy by Epstein-Barr virus (EBV)-based plasmid vectors. Curr. Gene. Ther. 2, 379–392 (2002)

    Article  Google Scholar 

  10. Murshed, M., Buyya, R., Abramson, D.: GridSim: A Grid Simulation Toolkit for Resource Management and Scheduling in Large-Scale Grid Computing Environments. In: Proc. of the 17th IEEE International Symposium on Parallel and Distributed (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, T. et al. (2006). Family Gene Based Grid Trust Model. In: Jiao, L., Wang, L., Gao, X., Liu, J., Wu, F. (eds) Advances in Natural Computation. ICNC 2006. Lecture Notes in Computer Science, vol 4222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11881223_14

Download citation

  • DOI: https://doi.org/10.1007/11881223_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45907-1

  • Online ISBN: 978-3-540-45909-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics