Abstract
The Grid Security Infrastructure (GSI) proposed and implemented in Globus Toolkit has been a widely accepted solution for the security of grids in recent years. But there is no formal analysis or modelling on security mechanisms of GSI emerging in the literature yet. In this paper, we propose a formal logic, and formalize those primary security mechanisms using the logic. Our formalism not only is useful in understanding GSI but also provides us a substantial theoretic basis for some high-level security mechanisms to be developed based on GSI for the emerging service-oriented grid.
This work is supported by 973 project (No.2002CB312002) of China, ChinaGrid Program of MOE of China, and grand project of the Science and Technology Commission of Shanghai Municipality (No. 03dz15027)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Foster, I., Kesselman, C. (eds.): The Grid: Blueprint for a new computing infrastructure. Morgan Kaufmann, San Francisco (1999)
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: enabling scalable virtual organizations. International Journal of High Performance Computing Application 15(3), 200–222 (2001)
Foster, I., Kesselman, C., Tuecke, S.: A security architecture for computational grid. In: Proc. 5th ACM Conference on Computer and Communications Security Conference, pp. 83–92 (1998)
Welch, W., Siebenlist, F., Foster, I., Bresnahan, J., Czajkowski, K., Gawor, J., Kesselman, C., Meder, S., Pearlman, L., Tuecke, S.: Security for grid services. In: Twelfth International Symposium on High Performance Distributed Computing, Seattle, Washington, pp. 48–57 (2003)
Foster, I., Kesselman, C.: Intl., J. Globus: A metacomputing infrastructure toolkit. Super-computer Applications 11(2), 115–128 (1997)
Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The physiology of the grid: An open grid services architecture for distributed systems integration. Open Grid Service Infrastructure WG, Global Grid Forum (2002)
Halpern, J.Y., Moses, Y.: A guide to completeness and complexity for modal logics of knowledge and belief. Artificial Intelligence 54, 319–379 (1992)
Grandison, T., Sloman, M.: A survey of trust in Internet applications. IEEE Communications Surveys (2000)
Chuchang, L., Maris, O.A.: Trust in secure communication systems-the concept, representations and reasoning techniques. In: 15th Australian Joint Conference on Artificial Intelligence Canberra, pp. 60–70 (2002)
Rangan, P.: An axiomatic basis of trust in distributed systems. In: Proc. of the IEEE CS Symp. on Research in Security and Privacy, pp. 204–211 (1988)
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems 15(4), 706–734 (1993)
Tuecke, S., Engert, D., Foster, I., Thompson, M., Pearlman, L., Kesselman, C.: Internet X.509 Public Key Infrastructure-Proxy Certificate Profile Internet Draft (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, B., Rao, R., Li, M., You, J. (2004). A Formal Model for the Grid Security Infrastructure. In: Zhou, X., Su, S., Papazoglou, M.P., Orlowska, M.E., Jeffery, K. (eds) Web Information Systems – WISE 2004. WISE 2004. Lecture Notes in Computer Science, vol 3306. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30480-7_73
Download citation
DOI: https://doi.org/10.1007/978-3-540-30480-7_73
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23894-2
Online ISBN: 978-3-540-30480-7
eBook Packages: Springer Book Archive