Automating security configuration for the Grid
نویسندگان
چکیده
Administration of Grid resources is a time consuming and often tedious job. Most administrative requests are predictable, and in general, handling them requires knowledge of the local resources and the requester. In this paper we discuss a system to provide automated support for administrative requests, such as resource reservation and user account management. We propose using trust metrics to help judge the merits and suitability of each request. We outline how these metrics can be implemented using trust management techniques into a practical system we call GridAdmin.
منابع مشابه
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملSecure Grid Service Engineering for Industrial Optimization Problems
Many industrial optimization problems require high computational power and hence are ideally executed in a Grid environment. Since the development and configuration of Grid Services – especially the security configurations – is a very complex task, an engineer needs – besides deep knowledge in his/her application domain – knowledge in configuring the Grid middleware. Since setting up the Grid m...
متن کاملOn-grid and Off-grid Operation of Multi-Input Single-Output DC/DC Converter based Fuel Cell Generation System
This paper presents the modeling and simulation of a proton exchange membrane fuel cell (PEMFC) generation system for off-grid and on-grid operation and configuration. A fuel cell DG system consists of a fuel cell power plant, a DC/DC converter and a DC/AC inverter. The dynamic model for fuel cell array and its power electronic interfacing are presented also a multi-input single output (MISO) D...
متن کاملInvestigating the Effect of Spatial Configuration Components on Security Indicators in the Iranian Bazar Using the Theory of Space Arrangement (Case Study: Historical Bazar Sera’s of Borujard)
Security is a very important issue in the development and dynamics of urban spaces. One of the areas in which security is considered very important in its development is the economic sector, and bazar security is essential as a clear manifestation of economic activities. The Iranian Bazar is one of the important urban spaces and its economic beating heart, and it consists of different spaces, o...
متن کاملAutomating Risk Analysis of Software Design Models
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Scientific Programming
دوره 13 شماره
صفحات -
تاریخ انتشار 2005