Volume 32 Issue 03
Mar.  2006
Turn off MathJax
Article Contents
Zhang Rongqing, Li Jianxin, Huai Jinpenget al. Secure trust negotiation system for grid computing[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(03): 347-351. (in Chinese)
Citation: Zhang Rongqing, Li Jianxin, Huai Jinpenget al. Secure trust negotiation system for grid computing[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(03): 347-351. (in Chinese)

Secure trust negotiation system for grid computing

  • Received Date: 24 Jun 2005
  • Publish Date: 31 Mar 2006
  • Grid technology promotes resource sharing and collaboration over wide area network. However, service providers and requestors are always located in different secure domains in grid environment. How to establish trust between strangers without prior relationship has become a pressing problem. A system named secure trust negotiation system was designed and implemented, which depends on the trust management infrastructure, establishes trust between strangers with iterative disclosure of credentials and access control policies and can protect participants’ private information. A sort of attributed-based authorization credential and access control policy was adopted. A novel algorithm for compliance checker of credentials and access policies was carefully designed, which can be used togenerate all the minimal satisfied sets of credentials, so that the trust relationship exsited in theory can be established automatically. During the process of trust negotiation using this system, secure transmission of credentials disclosed was ensured by other subsystems of CROWN. Through the application in CROWN grid, it shows contributions to the automated trust establishment and privacy protection.

     

  • loading
  • [1] Yu T, Winslett M. A unified scheme for resource protection in automated trust negotiation . IEEE Symposium on Security and Privacy . Berkeley, California:IEEE, 2003.110~122 [2] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management . Proceedings of 17th Symposium on Security and Privacy . Oakland:IEEE, 1996.164~173 [3] Winsborough W H, Seamons K E, Jones V E. Automated trust negotiation .DARPA Information Survivability Conference and Exposition . IEEE, 2000.88~102 [4] Barlow T, Hess A, Seamons K E. Trust negotiation in electronic markets . Eighth Research Symposium in Emerging Electronic Markets . Maastricht, Netherlands, 2001 [5] Li Ninghui, Winsborough W H, Mitchell J C,et al. Distributed credential chain discovery in trust management . Proceedings of the 8th ACM Conference on Computer and Communications Security . ACM Press, 2001.156~165 [6] Winslett M, Yu T, Seamons K E, et al. Negotiating trust on the web . IEEE Internet Computing . IEEE, 2002.30~37 [7] Hu Chunming, Huai Jinpeng, Zhu Yanmin,et al. Efficient information service management using service club in CROWN grid . Proceedings of the 2005 IEEE International Conference on Services Computing .IEEE Computer Society Press,2005.5~12 [8] Amir H, Yosi M, Joris M, et al. Access control meets public key infrastructure . Proceedings of the 2000 IEEE Symposium on Security and Privacy . Oakland:IEEE Computer Society Press, 2000.2~14
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(3236) PDF downloads(937) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return