Abstract
The grid security is an important component, and it directly affects the development of the grid and the practical application of grid system software. As a kind of tool, GSI(Grid Security Infrastructure) provides some services such as authentication, and access control and so on and there’s a trust relationship among the subject and object in advance. With the development of grid, in which the interaction scopes of nodes have exceeded the original intra-domain this relationship has not met the grids’ needs for security already. Some new access control strategies on grid environment based on trust and security grade were given. In this article, the subject and the object were extended, the classification and the reputation grade were extended and the concepts of organization security classification and organization reputation grade were defined. Through their reasonableness analysis and research, the strategies are improved and expanded about existing access control strategies, that can be apply to the grid environment, there has some positive significance about grid security research.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
The Globus Project (EB/OL), http://www.globus.org/
Jin, N.: The grid safe authentication key technologies studies. Nanjing Posts and telecommunications University master’s degree paper (2006) (in Chinese)
Oo, M.P., Naing, T.T.: Access Control System for Grid Security Infrastructure. In: 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology – Workshops, pp. 299–302 (2007)
Han, B.: Study on data management and the security problem Under the grid environment. Chinese Scientific and Technical University master’s degree paper (2006) (in Chinese)
Huang, X., Chen, L., Huang, L., Li, M.: An Identity-Based Model for Grid Security Infrastructure. In: Ramos, F.F., Larios Rosillo, V., Unger, H. (eds.) ISSADS 2005. LNCS, vol. 3563, pp. 258–266. Springer, Heidelberg (2005)
Wang, F.: Study Under the grid environment’s trust mechanism. Nanjing Posts and telecommunications University master’s degree paper, 52–53 (2009) (in Chinese)
J-sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)
Jiang, S., Li, J.: A Reputation-Based Trust Mechanism for P2P E-Commerce Systems. Journal of Software 18(10), 2551–2563 (2007) (in Chinese)
Tang, Y., Quan, Y., Hu, Y.: Hierarchy –based access contrl in p2p. In: CCICS 2005, pp. 301–306. Science, Beijing (2005) (in Chinese)
Liu, Y., Sheng, C.: A New Information Security Function And Application Model. Journal of Computer Aided Design & Computer Graphics 17(12), 2734–2738 (2005) (in Chinese)
Liu, Y.: P2P Access Control Research Based on Interest Classification, Trust and Security Grade. Journal of Beijing University of Technology 36(5), 674–678 (2010) (in Chinese)
Du, Z., Chen, Y., Liu, P.: Grid Computing. Tsinghua University Press, Beijing (2002) (in Chinese)
Liu, Y.: Research on Access Control Based Grid Environment. Journal of Computational Information Systems 6(13), 4503–4512 (2010)
Bell, D.E., Lapadula, L.J.: Secure compter system: mathematical foundation. MTR-2527, Mitrecorp, Bedford, MA, NTIS AD771543 (1973)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, Y. (2011). Study on Grid Access Control Strategy Based on Trust and Security Grade. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds) Web Information Systems and Mining. WISM 2011. Lecture Notes in Computer Science, vol 6987. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23971-7_50
Download citation
DOI: https://doi.org/10.1007/978-3-642-23971-7_50
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23970-0
Online ISBN: 978-3-642-23971-7
eBook Packages: Computer ScienceComputer Science (R0)