Author(s): H. Liu & X. Lin
Security issues exist in the whole life cycle of the trustworthy grids.
They are not
only the value-added points of grids but also the lifelines of grids.
of the trustworthy grids rests with using web services to integrate different interoperability
security components for the purpose of defining, managing and
enforcing trust through virtual organizations.
This chapter presents a glimpse on
the fundamentals of computer security and grid security, including the semantics
of security and threat, policy and mechanism, cryptography and checksum, key
management, cryptographic key infrastructure, stream cipher, block cipher, TLS,
IPsec, GSI and CAS, grid security services, web services specifications and standards,
risk analysis and threat model, etc.
The material focuses on the theoretical
aspects of these building blocks that can be employed to build the trustworthy
1 Importance of Grid security
Grids are promised and shaped to be the next generation platforms for scientists,
engineers, businessmen, every walk of life, and ordinary Internet surfers to solve
large-scale, complex, interdisciplinary, data, computation and services oriented
problems using CPU, data storage, instrumentation and human resources geographically
distributed across some virtual organizations [1–3].
Its vivid and
famous logo is to allow users to achieve the sharing resources and services as easily
as one can get the electrical power through a wall socket.
Grid security concerns all security aspects of the gird systems.
As shown in
1, security issues exist in the whole life cycle of designing, implementing,
deploying and managing the grid systems.
Firstly, grid security must assure that
the resources are controlled by their providers and subjected to all kinds of policies.
Secondly, grid security must facilitate coordination between different virtual
Size: 49,624 kb
Paper DOI: 10.2495/1-84564-055-1/06
the Full Article
You can purchase the full text version of this article in Adobe PDF format for the above price. Please click the 'Buy Paper' icon below to purchase this paper.
this page to a colleague.