Application of Grid Security to Personal Distributed Environments
نویسندگان
چکیده
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile devices, however, have limits on their computational resources that make it difficult to achieve this goal. The Personal Distributed Environment (PDE) is a new concept in mobile networks which, by constraining the problem, overcomes the resource limitation. This paper introduces the concept of the PDE and compares it with the Grid environment. The paper focuses on the specific problem of how to secure the mobile device and in particular how Grid security may be applied to this new environment. The PDE allows simple Grid security mechanisms to be adapted and applied within the PDE boundaries, while allowing a gateway device to support open standards as they emerge. In adopting a hybrid approach, a migration path to open standards is provided, as the computational resources of mobile devices increase.
منابع مشابه
An Efficient Data Replication Strategy in Large-Scale Data Grid Environments Based on Availability and Popularity
The data grid technology, which uses the scale of the Internet to solve storage limitation for the huge amount of data, has become one of the hot research topics. Recently, data replication strategies have been widely employed in distributed environment to copy frequently accessed data in suitable sites. The primary purposes are shortening distance of file transmission and achieving files from ...
متن کاملArtificial Neural Network support to monitoring of the evolutionary driven security aware scheduling in computational distributed environments
Monitoring of the system performance in highly distributed computing environments is a wide research area. In cloud and grid computing, it is usually restricted to the utilization and reliability of the resources. However, in today’s Computational Grids (CGs) and Clouds (CCs), the end users may define the special personal requirements and preferences in the resource and service selection, servi...
متن کاملAn adaptive scheme for distributed dynamic security assessment of large scale power systems
The requirements for significant computational resources imposed by dynamic security assessment applications have led to an increasing interest in the use of parallel and distributed computing technologies. This paper presents an adaptive scheme that involves user-friendly flat application program interfaces for scripting and an object-oriented programming environment for distributed dynamic se...
متن کاملPC proliferation: Minimizing corporate risk through planning for application maintenance
The rapid proliferation of personal computers, offering tremendous productivity gains for knowledge workers, often creates new application maintenance tasks. Specific concerns include security, data integrity, and access authorization. Distributed networks require security and communication systems. Distributed data entry requires file servers, network support personnel, and synchronization met...
متن کاملA Specification for Security Services on Computational Grids
In this paper we present a computational infrastructure, the Security Backbone, which is able to satisfy security requirements arising from resource sharing and services interoperability in Grid-like environments, without having to rely on a PublicKey Infrastructure (PKI). Motivation of our approach is rooted in the well-known difficulties encountered to show that interoperability of PKIs is ef...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004