DocumentCode :
153265
Title :
Using Security Patterns for Modelling Security Capabilities in Grid Systems
Author :
Aziz, Babar ; Blackwell, Clive
Author_Institution :
Sch. of Comput., Univ. of Portsmouth, Portsmouth, UK
fYear :
2014
fDate :
7-11 April 2014
Firstpage :
422
Lastpage :
427
Abstract :
We extend previous work on formalising design patterns to start the development of security patterns for Grid systems. We demonstrate the feasibility of our approach with a case study involving a deployed security architecture in a Grid Operating System called XtreemOS. A number of Grid security management capabilities that aid the secure setting-up and running of a Grid are presented. We outline the functionality needed for such cases in a general form, which could be utilised when considering the development of similar large-scale systems in the future. We also specifically describe the use of authentication patterns that model the extension of trust from a secure core, and indicate how these patterns can be composed, specialised and instantiated.
Keywords :
grid computing; operating systems (computers); security of data; XtreemOS; authentication patterns; design patterns formalization; grid operating system; grid security management capabilities; grid systems; security capabilities modeling; security patterns; trust extension; Authentication; Databases; Monitoring; Operating systems; Public key; Receivers; Grid operating systems; Security patterns; authentication patterns; security architectures;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on
Conference_Location :
Oxford
Type :
conf
DOI :
10.1109/SOSE.2014.60
Filename :
6830942
Link To Document :
بازگشت