{"title":"基于信任的网格资源访问控制","authors":"Bhavna Gupta, Harmeet Kaur, N. Namita, Punam Bedi","doi":"10.1109/CSNT.2011.146","DOIUrl":null,"url":null,"abstract":"For a highly computational resource sharing grid environment, reliable transactions between entities is a major requirement. This is possible when not only do the users of the grid have an appropriate mechanism to select resource providers but the grid users must also pass through proper access control mechanisms placed by the resource providers Traditional Identity based access control methods are not applicable for grids because relationship between users and resource providers are ad hoc and dynamic, no central policy will be applicable. In this paper, users identify reputed resource providers by applying Fuzzy inference system on recommendation taken from its trustworthy acquaintances. The resource providers apply binary logistic regression on factors that influence the decision whether to allow a requesting user to use the grid or not.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Trust Based Access Control for Grid Resources\",\"authors\":\"Bhavna Gupta, Harmeet Kaur, N. Namita, Punam Bedi\",\"doi\":\"10.1109/CSNT.2011.146\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For a highly computational resource sharing grid environment, reliable transactions between entities is a major requirement. This is possible when not only do the users of the grid have an appropriate mechanism to select resource providers but the grid users must also pass through proper access control mechanisms placed by the resource providers Traditional Identity based access control methods are not applicable for grids because relationship between users and resource providers are ad hoc and dynamic, no central policy will be applicable. In this paper, users identify reputed resource providers by applying Fuzzy inference system on recommendation taken from its trustworthy acquaintances. The resource providers apply binary logistic regression on factors that influence the decision whether to allow a requesting user to use the grid or not.\",\"PeriodicalId\":294850,\"journal\":{\"name\":\"2011 International Conference on Communication Systems and Network Technologies\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Communication Systems and Network Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSNT.2011.146\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Communication Systems and Network Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT.2011.146","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
For a highly computational resource sharing grid environment, reliable transactions between entities is a major requirement. This is possible when not only do the users of the grid have an appropriate mechanism to select resource providers but the grid users must also pass through proper access control mechanisms placed by the resource providers Traditional Identity based access control methods are not applicable for grids because relationship between users and resource providers are ad hoc and dynamic, no central policy will be applicable. In this paper, users identify reputed resource providers by applying Fuzzy inference system on recommendation taken from its trustworthy acquaintances. The resource providers apply binary logistic regression on factors that influence the decision whether to allow a requesting user to use the grid or not.