• DocumentCode
    153265
  • Title

    Using Security Patterns for Modelling Security Capabilities in Grid Systems

  • Author

    Aziz, Babar ; Blackwell, Clive

  • Author_Institution
    Sch. of Comput., Univ. of Portsmouth, Portsmouth, UK
  • fYear
    2014
  • fDate
    7-11 April 2014
  • Firstpage
    422
  • Lastpage
    427
  • Abstract
    We extend previous work on formalising design patterns to start the development of security patterns for Grid systems. We demonstrate the feasibility of our approach with a case study involving a deployed security architecture in a Grid Operating System called XtreemOS. A number of Grid security management capabilities that aid the secure setting-up and running of a Grid are presented. We outline the functionality needed for such cases in a general form, which could be utilised when considering the development of similar large-scale systems in the future. We also specifically describe the use of authentication patterns that model the extension of trust from a secure core, and indicate how these patterns can be composed, specialised and instantiated.
  • Keywords
    grid computing; operating systems (computers); security of data; XtreemOS; authentication patterns; design patterns formalization; grid operating system; grid security management capabilities; grid systems; security capabilities modeling; security patterns; trust extension; Authentication; Databases; Monitoring; Operating systems; Public key; Receivers; Grid operating systems; Security patterns; authentication patterns; security architectures;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on
  • Conference_Location
    Oxford
  • Type

    conf

  • DOI
    10.1109/SOSE.2014.60
  • Filename
    6830942