[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1365562.1365568acmconferencesArticle/Chapter ViewAbstractPublication PagesautonomicsConference Proceedingsconference-collections
research-article

On trust management in grids

Published: 28 October 2007 Publication History

Abstract

This paper presents an overview of the different concepts and technologies for managing trust in Grids. It examines the relation between trust and security, introducing the current technology for managing trust. The classical Virtual Organisation lifecycle is augmented with trust management actions.

References

[1]
A. Abdul-Rahma, S. Hailes. Supporting Trust in Virtual Communities. In Hawaii Int. Conference on System Sciences 33, 2000.
[2]
M. D. Abrams and M. V. Joyce. Trusted Computing Update. Computers and Security, 14(1):57--68, 1995.
[3]
R. Alfieri, R. Cecchini, V. Ciaschini, L. dell Agnello, A. Frohner, A. Gianoli, K. Lorentey, F. Spataro. VOMS: An authorization system for virtual organizations. In F. Fernandez Rivera, M. Bubak, A. Gomez Tato, and R. Doallo, editors, Grid Computing: First European Across Grids Conference, volume 2970 of Lecture Notes in Computer Science, pages 33--40. Springer, 2004.
[4]
A. E. Arenas (ed). Survey material on trust and security in grids. CoreGRID Project Deliverable D.IA.03, October 2005.
[5]
A. E. Arenas, I. Djordjevic, T. Dimitrakos, L. Titkov, J. Claessens, C. Geuer-Pollman, E. Lupu, N. Tuptuk, S. Wesner, L. Schubert. Towards web services profiles for trust and security in virtual organisations. In A. Ortiz L. M. Camarinha-Matos, H. Afsarmanesh, editor, Collaborative Networks and their Breeding Environments. Springer, 2005.
[6]
P. J. Broadfoot, A. P. Martin. A critical survey of grid security requirements and technologies. Oxford University Computing Laboratory Technical Report, PRG-RR-03-15, 2003.
[7]
A. Chakrabarti. Grid computing security. Springer, 2007.
[8]
D. Chadwick. Authorisation in grid computing. Information Security Technical Report, 10(1):33--40, 2005.
[9]
F. D'andria, J. Martrat, T. Kirkham, S. Naqvi, J. Gallop, A. E. Arenas. The evolving use of service level agreements and the influence of trust within the support and development of grids to enable a next generation of business models. International Workshop on Service Oriented Computing: a Look at the Inside (SOC@Inside'07), Austria, 2007
[10]
T. Dimitrakos. System models, e-risk and e-trust: towards bridging the gap? In V. Tschammer B. Schmid, K. Stanoevska-Slabeva, editor, Towards the E-Society: E-Business, E-Commerce, and E-Government. Kluwer Academic Publishers, 2001.
[11]
D. Gambetta. Can we trust trust? In D. Gambetta, editor. Trust: Making and Breaking Cooperative Relations. University of Oxford, 2000.
[12]
T. Grandison, M. Sloman. A survey of trust in internet applications. IEEE Communications Survey and Tutorials, 3, 2000.
[13]
A. Josang. An algebra for assessing trust in certification chains. In J. Kochmar, editor, Proceedings of the Network and Distributed Systems Security Symposium (NDSS'99). The Internet Society, 1999.
[14]
A. Josang, R. Ismail, C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), pages 618--644, 2007.
[15]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust algorithm for reputation management in P2P networks. In WWW '03: Proceedings of the 12th international conference on World Wide Web, pages 640--651, New York, NY, USA, 2003. ACM Press.
[16]
F. Kerschbaum, J. Haller, Y. Karabulut, and P. Robinson. Pathtrust: A trust-based reputation service for virtual organization formation. In iTrust2006, 4th International Conference on Trust Management, Vol. 3986, Lecture Notes in Computer Science, pp. 193--205. Springer, 2006.
[17]
S. Lee, R. Sherwood, B. Bhattacharjee. Cooperative peer groups in NICE. In IEEE INFOCOM, 2003.
[18]
J. Linn (ed). Liberty trust models guidelines. Liberty Alliance Project, version 1, 2004.
[19]
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke. A community authorization service for group collaboration. In Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, 2002.
[20]
L. Rasmusson, S. Janssen. Simulated social control for secure internet commerce. In C. Meadows, editor, Proceedings of the 1996 New Security Paradigms Workshop. ACM, 1996.
[21]
G. C. Silaghi, A. E. Arenas, L. M. Silva. A utility-based reputation model for service-oriented computing. Toward Next Generation Grids, Proceedings of the CoreGRID Symposium 2007. Springer, 2007.
[22]
G. C. Silaghi, A. E. Arenas, L. M. Silva. Reputation-based trust management systems and their applicability to grids. CoreGRID Technical Report TR-0064, 2006.
[23]
M. Steenbakkers. Guide to LCAS. Version 1.1.16. Documentation of the European DataGrid Project, 2003.
[24]
G. von Laszewski, B. E. Alunkal, I. Veljkovic. Towards reputable grids. Scalable Computing: Practice and Experience, 6(3):95--106, 2005.
[25]
V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, S. Tuecke. Security for grid services. In International Symposium High Performance Distributed Computing, pp. 48--57, 2003.
[26]
S. Wesner, L. Schubert, T. Dimitrakos. Dynamic virtual organizations in engineering. In Proceedings of German-Russian Workshop, 2005
[27]
L. Xiong, L. Liu. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions of Knowledge and Data Engineering, vol. 16, no. 7, pp. 179--194, 2004.
[28]
P. R. Zimmermann. The Official PGP User's Guide. MIT Press, 1995.

Cited By

View all
  • (2013)RETENTIONJournal of Network and Computer Applications10.1016/j.jnca.2012.06.00236:1(274-283)Online publication date: 1-Jan-2013
  • (2012)A QoS-based fine-grained reputation system in the grid environmentConcurrency and Computation: Practice & Experience10.1002/cpe.182424:17(1990-2006)Online publication date: 1-Dec-2012
  • (2011)Model-based refinement of security policies in collaborative virtual organisationsProceedings of the Third international conference on Engineering secure software and systems10.5555/1946341.1946343(1-14)Online publication date: 9-Feb-2011
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
Autonomics '07: Proceedings of the 1st international conference on Autonomic computing and communication systems
October 2007
223 pages
ISBN:9789639799097
  • Conference Chair:
  • F. Davide

Sponsors

Publisher

ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

Brussels, Belgium

Publication History

Published: 28 October 2007

Check for updates

Author Tags

  1. grid security
  2. grids
  3. trust management
  4. virtual organisation

Qualifiers

  • Research-article

Conference

AUTONOMICS07
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2013)RETENTIONJournal of Network and Computer Applications10.1016/j.jnca.2012.06.00236:1(274-283)Online publication date: 1-Jan-2013
  • (2012)A QoS-based fine-grained reputation system in the grid environmentConcurrency and Computation: Practice & Experience10.1002/cpe.182424:17(1990-2006)Online publication date: 1-Dec-2012
  • (2011)Model-based refinement of security policies in collaborative virtual organisationsProceedings of the Third international conference on Engineering secure software and systems10.5555/1946341.1946343(1-14)Online publication date: 9-Feb-2011
  • (2010)GUTSProceedings of the 6th international conference on Security and trust management10.5555/2050149.2050155(84-99)Online publication date: 23-Sep-2010
  • (2010)Modeling and negotiating service qualityService research challenges and solutions for the future internet10.5555/1985668.1985674(157-208)Online publication date: 1-Jan-2010
  • (2010)Technology transfer of dynamic IT outsourcing requires security measures in SLAsProceedings of the 7th international conference on Economics of grids, clouds, systems, and services10.5555/1884547.1884549(1-15)Online publication date: 31-Aug-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media