Chapter Ii Literature Survey on Grid Security Models and Mechanisms

ثبت نشده
چکیده

The previous chapter of this thesis describes various aspects of grid computing environment and the security issues associated with grids. In this chapter, we present a detailed survey of relevant literature in grid computing security. The aim of this survey work is to present current research trends from the point of view of the security models and authorization mechanisms available in the grid computing environment. Efforts have been made to present an up-to-date research information with details of approaches, algorithms and implementation systems that have been developed and used during the last decade of grid computing evolution. The chapter has been organized as follows. First we review the literature work in the general area of grid computing security. In section 3, we present various schemes in the grid access control. Section 4 discusses the grid authorization attempts. Section 5 presents the research in trust relationships in grid computing. Next, we present the security issues identified as part of this survey. Section 7 discusses the need for grid access control and the characteristics of an ideal grid security mechanism. Finally we summarize the chapter.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

REVIEW SECTION

A Look at Contemporary Persian Poetry, Currents in Persian Poetry in 20th Century This book is a historical survey of literature though the writer has tried to distance himself from ancient approaches and to apply a modern look of analysis, critique and stylistics. In the first chapter the methodology is discussed followed by the second chapter which talks of text and metatext and the relation...

متن کامل

A Survey of Agricultural Productivity and Nutritional Status in Rural South Wollo, Ethiopia

.............................................................................................................. ii ACKNOWLEDGMENTS ......................................................................................... iv CHAPTER ONE: INTRODUCTION ......................................................................... 1 CHAPTER TWO: REVIEW OF THE LITERATURE .....................................

متن کامل

Game-based Models of Grid Users’ Decisions in Security Aware Scheduling

This chapter summarizes our recent research on game-theoretical models of grid users’ behavior in security aware scheduling. The main scheduling attributes, generic model of security aware management in local grid clusters and several scenarios of users’ games are presented. Four GA-based hybrid schedulers have been implemented for the approximation of the equilibrium states of exemplary simple...

متن کامل

Security in grid computing: A review and synthesis

This paper provides an extensive survey of the different methods of addressing security issues in the grid computing environment, and specifically contributes to the research environment by developing a comprehensive framework for classification of these research endeavors. The framework presented classifies security literature into System Solutions, Behavioral Solutions, Hybrid Solutions and R...

متن کامل

Security in grid computing

In this paper, first we survey security problems which exist in grid computing and then we analyze security requirements. At the end we introduce a framework which Erin Cody has posed as a solution for security problems of grid computing. The framework presented classifies security literature into System Solutions, Behavioral Solutions and Hybrid Solutions.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012