Chapter Ii Literature Survey on Grid Security Models and Mechanisms
ثبت نشده
چکیده
The previous chapter of this thesis describes various aspects of grid computing environment and the security issues associated with grids. In this chapter, we present a detailed survey of relevant literature in grid computing security. The aim of this survey work is to present current research trends from the point of view of the security models and authorization mechanisms available in the grid computing environment. Efforts have been made to present an up-to-date research information with details of approaches, algorithms and implementation systems that have been developed and used during the last decade of grid computing evolution. The chapter has been organized as follows. First we review the literature work in the general area of grid computing security. In section 3, we present various schemes in the grid access control. Section 4 discusses the grid authorization attempts. Section 5 presents the research in trust relationships in grid computing. Next, we present the security issues identified as part of this survey. Section 7 discusses the need for grid access control and the characteristics of an ideal grid security mechanism. Finally we summarize the chapter.
منابع مشابه
REVIEW SECTION
A Look at Contemporary Persian Poetry, Currents in Persian Poetry in 20th Century This book is a historical survey of literature though the writer has tried to distance himself from ancient approaches and to apply a modern look of analysis, critique and stylistics. In the first chapter the methodology is discussed followed by the second chapter which talks of text and metatext and the relation...
متن کاملA Survey of Agricultural Productivity and Nutritional Status in Rural South Wollo, Ethiopia
.............................................................................................................. ii ACKNOWLEDGMENTS ......................................................................................... iv CHAPTER ONE: INTRODUCTION ......................................................................... 1 CHAPTER TWO: REVIEW OF THE LITERATURE .....................................
متن کاملGame-based Models of Grid Users’ Decisions in Security Aware Scheduling
This chapter summarizes our recent research on game-theoretical models of grid users’ behavior in security aware scheduling. The main scheduling attributes, generic model of security aware management in local grid clusters and several scenarios of users’ games are presented. Four GA-based hybrid schedulers have been implemented for the approximation of the equilibrium states of exemplary simple...
متن کاملSecurity in grid computing: A review and synthesis
This paper provides an extensive survey of the different methods of addressing security issues in the grid computing environment, and specifically contributes to the research environment by developing a comprehensive framework for classification of these research endeavors. The framework presented classifies security literature into System Solutions, Behavioral Solutions, Hybrid Solutions and R...
متن کاملSecurity in grid computing
In this paper, first we survey security problems which exist in grid computing and then we analyze security requirements. At the end we introduce a framework which Erin Cody has posed as a solution for security problems of grid computing. The framework presented classifies security literature into System Solutions, Behavioral Solutions and Hybrid Solutions.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012