Skip to main content

Study on Grid Access Control Strategy Based on Trust and Security Grade

  • Conference paper
  • 1114 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6987))

Abstract

The grid security is an important component, and it directly affects the development of the grid and the practical application of grid system software. As a kind of tool, GSI(Grid Security Infrastructure) provides some services such as authentication, and access control and so on and there’s a trust relationship among the subject and object in advance. With the development of grid, in which the interaction scopes of nodes have exceeded the original intra-domain this relationship has not met the grids’ needs for security already. Some new access control strategies on grid environment based on trust and security grade were given. In this article, the subject and the object were extended, the classification and the reputation grade were extended and the concepts of organization security classification and organization reputation grade were defined. Through their reasonableness analysis and research, the strategies are improved and expanded about existing access control strategies, that can be apply to the grid environment, there has some positive significance about grid security research.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The Globus Project (EB/OL), http://www.globus.org/

  2. Jin, N.: The grid safe authentication key technologies studies. Nanjing Posts and telecommunications University master’s degree paper (2006) (in Chinese)

    Google Scholar 

  3. Oo, M.P., Naing, T.T.: Access Control System for Grid Security Infrastructure. In: 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology – Workshops, pp. 299–302 (2007)

    Google Scholar 

  4. Han, B.: Study on data management and the security problem Under the grid environment. Chinese Scientific and Technical University master’s degree paper (2006) (in Chinese)

    Google Scholar 

  5. Huang, X., Chen, L., Huang, L., Li, M.: An Identity-Based Model for Grid Security Infrastructure. In: Ramos, F.F., Larios Rosillo, V., Unger, H. (eds.) ISSADS 2005. LNCS, vol. 3563, pp. 258–266. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Wang, F.: Study Under the grid environment’s trust mechanism. Nanjing Posts and telecommunications University master’s degree paper, 52–53 (2009) (in Chinese)

    Google Scholar 

  7. J-sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)

    Article  Google Scholar 

  8. Jiang, S., Li, J.: A Reputation-Based Trust Mechanism for P2P E-Commerce Systems. Journal of Software 18(10), 2551–2563 (2007) (in Chinese)

    Article  Google Scholar 

  9. Tang, Y., Quan, Y., Hu, Y.: Hierarchy –based access contrl in p2p. In: CCICS 2005, pp. 301–306. Science, Beijing (2005) (in Chinese)

    Google Scholar 

  10. Liu, Y., Sheng, C.: A New Information Security Function And Application Model. Journal of Computer Aided Design & Computer Graphics 17(12), 2734–2738 (2005) (in Chinese)

    Google Scholar 

  11. Liu, Y.: P2P Access Control Research Based on Interest Classification, Trust and Security Grade. Journal of Beijing University of Technology 36(5), 674–678 (2010) (in Chinese)

    Google Scholar 

  12. Du, Z., Chen, Y., Liu, P.: Grid Computing. Tsinghua University Press, Beijing (2002) (in Chinese)

    Google Scholar 

  13. Liu, Y.: Research on Access Control Based Grid Environment. Journal of Computational Information Systems 6(13), 4503–4512 (2010)

    Google Scholar 

  14. Bell, D.E., Lapadula, L.J.: Secure compter system: mathematical foundation. MTR-2527, Mitrecorp, Bedford, MA, NTIS AD771543 (1973)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Y. (2011). Study on Grid Access Control Strategy Based on Trust and Security Grade. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds) Web Information Systems and Mining. WISM 2011. Lecture Notes in Computer Science, vol 6987. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23971-7_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23971-7_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23970-0

  • Online ISBN: 978-3-642-23971-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics