Trusted Computing Enabled Access Control for Virtual Organizations

Jing Zhan, Huanguo Zhang
{"title":"Trusted Computing Enabled Access Control for Virtual Organizations","authors":"Jing Zhan, Huanguo Zhang","doi":"10.1109/CIS.WORKSHOPS.2007.214","DOIUrl":null,"url":null,"abstract":"Grid computing is becoming the prominent paradigm for resource exchange and collaboration, which are supported by dynamic, multi-institutional virtual organizations (VOs) overcoming limitations of time or space. As the de-facto standard for grid security, grid security infrastructure provides no effective mechanism to protect both resource providers and users from access of malicious entities. The trusted computing (TC) technology adopted by the trusted computing group (TCG) defines that an entity can be trusted as long as it always behaves in the expected manner. Specifically, the TC uses a hardware module called trusted platform module (TPM) to ensure the tamper-proof attestative behavior by integrity measurement, logging and report. In this paper, we propose and design a TC enabled system based on Linux and TPM hardware to enforce access control policy for the VO.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.214","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Grid computing is becoming the prominent paradigm for resource exchange and collaboration, which are supported by dynamic, multi-institutional virtual organizations (VOs) overcoming limitations of time or space. As the de-facto standard for grid security, grid security infrastructure provides no effective mechanism to protect both resource providers and users from access of malicious entities. The trusted computing (TC) technology adopted by the trusted computing group (TCG) defines that an entity can be trusted as long as it always behaves in the expected manner. Specifically, the TC uses a hardware module called trusted platform module (TPM) to ensure the tamper-proof attestative behavior by integrity measurement, logging and report. In this paper, we propose and design a TC enabled system based on Linux and TPM hardware to enforce access control policy for the VO.
基于可信计算的虚拟组织访问控制
网格计算正在成为资源交换和协作的重要范例,它由动态的、多机构的虚拟组织(VOs)提供支持,克服了时间或空间的限制。作为网格安全的事实标准,网格安全基础设施没有提供有效的机制来保护资源提供者和用户免受恶意实体的访问。可信计算组(TCG)采用的可信计算(TC)技术定义了一个实体只要始终按照预期的方式行为,就可以被信任。具体来说,TC使用一个名为TPM (trusted platform module)的硬件模块,通过完整性测量、日志记录和报告来确保防篡改的认证行为。在本文中,我们提出并设计了一个基于Linux和TPM硬件的TC支持系统,以对VO实施访问控制策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信