{"title":"Trusted Computing Enabled Access Control for Virtual Organizations","authors":"Jing Zhan, Huanguo Zhang","doi":"10.1109/CIS.WORKSHOPS.2007.214","DOIUrl":null,"url":null,"abstract":"Grid computing is becoming the prominent paradigm for resource exchange and collaboration, which are supported by dynamic, multi-institutional virtual organizations (VOs) overcoming limitations of time or space. As the de-facto standard for grid security, grid security infrastructure provides no effective mechanism to protect both resource providers and users from access of malicious entities. The trusted computing (TC) technology adopted by the trusted computing group (TCG) defines that an entity can be trusted as long as it always behaves in the expected manner. Specifically, the TC uses a hardware module called trusted platform module (TPM) to ensure the tamper-proof attestative behavior by integrity measurement, logging and report. In this paper, we propose and design a TC enabled system based on Linux and TPM hardware to enforce access control policy for the VO.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.214","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Grid computing is becoming the prominent paradigm for resource exchange and collaboration, which are supported by dynamic, multi-institutional virtual organizations (VOs) overcoming limitations of time or space. As the de-facto standard for grid security, grid security infrastructure provides no effective mechanism to protect both resource providers and users from access of malicious entities. The trusted computing (TC) technology adopted by the trusted computing group (TCG) defines that an entity can be trusted as long as it always behaves in the expected manner. Specifically, the TC uses a hardware module called trusted platform module (TPM) to ensure the tamper-proof attestative behavior by integrity measurement, logging and report. In this paper, we propose and design a TC enabled system based on Linux and TPM hardware to enforce access control policy for the VO.