Abstract
Trust model is an important component of gird security model and can be classified as mission-unaware identity trust model, mission-aware identity trust model, mission-unaware behavior trust model and mission-aware behavior trust model. All of them could be regarded as projections of mission-aware behavior trust model, by which authorization depends on not only the trust but also the cost and quantity of the mission. This paper proposes a formal description of this trust model by using abstract state machine (ASM). It will facilitate us understanding its semantics and accurate definitions, and bridging the gaps between de facto industry standards and this trust model. These formalizations are vertical refinements of the ASM based ground model for grids and could be easily jointed on it.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Gong, L., Reiter, M. (eds.) Proc. of the 5th ACM Conf. on Computer and Comm. Sec., pp. 83–92. ACM Press, New York (1998)
Nagaratnam, N., Janson, P., Dayka, J., Nadalin, A., Siebenlist, F., Welch, V., Tuecke, S., Foster, I.: Security Architecture for Open Grid Services. GWD-I Document, GGF OGSA Security Workgroup (2003)
A Joint White Paper from IBM Corporation and Microsoft Corporation: Security in a Web Services World: A Proposed Architecture and Roadmap (2002)
McHnight, D., Chervany, N.: Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model. In: Dennis, E. (ed.) Proc. of the 34th Ann. Hawaii Int. Conf. on Sys. Sci., pp. 2352–2361. IEEE Press, Hawaii (2001)
Hui, L., Qinke, P., Junyi, S., Baosheng, H.: A Mission-Aware Behavior Trust Model for Grid Computing Systems. In: Yanbo, H. (ed.) Proc. of the 2002 Int. Workshop on Grid and Cooperative Computing. Electronics Industry, Hainan, China, pp. 897–909 (2002)
Butler, R., Welch, V., Engert, D., Foster, I., Tuecke, S., Volmer, J., Kesselman, C.: A National-Scale Authentication Infrastructure. IEEE Computer 33, 60–66 (2000)
Welch, V., Siebenlist, F., Foster, I., Bresnahan, J., Czajkowski, K., Gawor, J., Kesselman, C., Meder1, S., Pearlman, L., Tuecke, S.: Security for Grid Services, http://www.globus.org/Security/GSI3/GT3-Security-HPDC.pdf
Natrajan, A., Humphrey, M., Grimshaw, A.: The Legion Support for Advanced Parameter- Space Studies on a Grid. Fut. Generation Computer Sys. 18, 1033–1052 (2002)
Azzedin, F., Maheswaran, M.: Evolving and Managing Trust in Grid Computing Systems. In: Kinsner, W., Sebak, A., Ferens, K. (eds.) Proc. of the IEEE Canadian Conf. on Electrical & Computer Eng., vol. 3, pp. 1424–1429. IEEE Press, Manitoba (2002)
Abdul-Rahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Ralph, H., Sprague, J. (eds.) Proc. of the 33rd Ann. Hawaii Int. Conf. on Sys. Sci., pp. 1769–1777. IEEE Press, Hawaii (2000)
Manchala, R.: E-Commerce Trust Metrics and Models. IEEE Internet Computing 4, 36–44 (2000)
Börger, E.: The Origins and Development of the ASM Method for High Level System Design and Analysis. J. of Univ. Computer Sci. 8, 2–74 (2002)
Gurevich, Y.: Draft on the ASM Guide (May 1997), http://www.eecs.umich.edu/gasm/papers/guide97.html
Zsolt, N., Vaidy, S.: Characterizing Grids: Attributes, Definitions and Formalisms. J. of Grid Computing. 1, 9–23 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, M. et al. (2004). Semantics and Formalizations of Mission-Aware Behavior Trust Model for Grids. In: Li, M., Sun, XH., Deng, Qn., Ni, J. (eds) Grid and Cooperative Computing. GCC 2003. Lecture Notes in Computer Science, vol 3032. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24679-4_149
Download citation
DOI: https://doi.org/10.1007/978-3-540-24679-4_149
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21988-0
Online ISBN: 978-3-540-24679-4
eBook Packages: Springer Book Archive