DocumentCode
153265
Title
Using Security Patterns for Modelling Security Capabilities in Grid Systems
Author
Aziz, Babar ; Blackwell, Clive
Author_Institution
Sch. of Comput., Univ. of Portsmouth, Portsmouth, UK
fYear
2014
fDate
7-11 April 2014
Firstpage
422
Lastpage
427
Abstract
We extend previous work on formalising design patterns to start the development of security patterns for Grid systems. We demonstrate the feasibility of our approach with a case study involving a deployed security architecture in a Grid Operating System called XtreemOS. A number of Grid security management capabilities that aid the secure setting-up and running of a Grid are presented. We outline the functionality needed for such cases in a general form, which could be utilised when considering the development of similar large-scale systems in the future. We also specifically describe the use of authentication patterns that model the extension of trust from a secure core, and indicate how these patterns can be composed, specialised and instantiated.
Keywords
grid computing; operating systems (computers); security of data; XtreemOS; authentication patterns; design patterns formalization; grid operating system; grid security management capabilities; grid systems; security capabilities modeling; security patterns; trust extension; Authentication; Databases; Monitoring; Operating systems; Public key; Receivers; Grid operating systems; Security patterns; authentication patterns; security architectures;
fLanguage
English
Publisher
ieee
Conference_Titel
Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on
Conference_Location
Oxford
Type
conf
DOI
10.1109/SOSE.2014.60
Filename
6830942
Link To Document