메뉴 건너뛰기




Volumn 12, Issue 3, 2007, Pages 123-138

Daonity - Grid security from two levels of virtualization

Author keywords

Behavior conformity; Grid computing; Grid security infrastructure (GSI); Platform attestation; Platform virtualization; Resource virtualization; Secure operating systems; Trusted computing (TC); Virtual organization (VO)

Indexed keywords

DATA STORAGE EQUIPMENT; NATURAL SCIENCES COMPUTING; SECURITY OF DATA; SERVERS; VIRTUAL REALITY;

EID: 35348963573     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2007.05.005     Document Type: Article
Times cited : (33)

References (51)
  • 2
    • 35349018338 scopus 로고    scopus 로고
    • Bair R, editor. Agarwal D, et al. (contributors). National collaboratories horizons. Report of the August 10-12, 2004. In: National Collaboratories Program Meeting. The U.S. Department of Energy Office of Science.
  • 3
    • 21644433634 scopus 로고    scopus 로고
    • Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, et al. Xen and the art of virtualization. In: Proceedings of the 19th ACM symposium on operating systems principles; 2003. p. 164-77.
  • 4
    • 85092890026 scopus 로고    scopus 로고
    • Chen B, Morris R. Certifying program execution with secure processors. In: Proceedings of ninth hot topics in operating systems symposium; 2003. p. 133-8.
  • 5
    • 34547196300 scopus 로고    scopus 로고
    • Chen L, Landfermann R, Loehr H, Rohe M, Sadeghi A-R, Stüble C. A protocol for property-based attestation. In: First ACM workshop on scalable trusted computing (STC'06); November 3, 2006. p. 7-16.
  • 6
    • 35348998337 scopus 로고    scopus 로고
    • Common Criteria. Available from: .
  • 7
    • 21644433634 scopus 로고    scopus 로고
    • Dragovic B, Fraser K, Hand S, Harris T, Ho A, Pratt I, et al. Xen and the art of virtualization. In: Proceedings of the ACM symposium on operating systems principles, Bolton Landing, NY; October 2003. p. 164-77.
  • 9
    • 0038305260 scopus 로고    scopus 로고
    • Figueiredo RJ, Dinda PA, Fortes JAB. A case for grid computing on virtual machines. In: Proc. 23rd international conference on distributed computing systems (ICDCS'03), Providence, RI; 2003. p. 550.
  • 11
    • 0032218229 scopus 로고    scopus 로고
    • Foster I, Kesselman C, Tsudik G, Tuecke S. A security architecture for computational grids. In: 5th ACM conference on computer and communications security; 1998. p. 83-92.
  • 12
    • 0035455653 scopus 로고    scopus 로고
    • The anatomy of the grid: enabling scalable virtual organizations
    • Foster I., Kesselman C., and Tuecke S. The anatomy of the grid: enabling scalable virtual organizations. Int High Perform Comput Appl 15 3 (2001) 200-222
    • (2001) Int High Perform Comput Appl , vol.15 , Issue.3 , pp. 200-222
    • Foster, I.1    Kesselman, C.2    Tuecke, S.3
  • 14
    • 35349008936 scopus 로고    scopus 로고
    • Globus Toolkit 4. .
  • 15
    • 35348997292 scopus 로고    scopus 로고
    • Haldar V, Chandra D, Franz M. Semantic remote attestation: a virtual machine directed approach to trusted computing. In: USENIX VM; 2004.
  • 16
    • 33947691568 scopus 로고    scopus 로고
    • Härtig H, Hohmuth M, Feske N, Helmuth C, Lackorzynski A, Mehnert F, et al., The Nizza secure-system architecture. In: Proc. of collaborate com; 2005.
  • 19
    • 35348989610 scopus 로고    scopus 로고
    • Krsul Ivan, Ganguly Arijit, Zhang Jian, Fortes Jose AB, Figueiredo Renato JO. VMPlants: providing and managing virtual machine execution environments for grid computing. SC; 2004.
  • 20
    • 17544370316 scopus 로고    scopus 로고
    • Lie D, Thekkath C, Mitchell M, Lincoln P, Boneh D, Mitchell J, et al. Architectural support for copy and tamper resistant software. In: Proceeding of international conference on architectural support for programming languages and operating systems; 2000. p. 168-77.
  • 24
    • 34250317714 scopus 로고    scopus 로고
    • Department of Computer Science, Dartmouth College, Hanover, New Hampshire Technical Report TR2005-532
    • Marchesini J., and Smith S. SHEMP - secure hardware enhancement for MyProxy (February 2005), Department of Computer Science, Dartmouth College, Hanover, New Hampshire Technical Report TR2005-532
    • (2005) SHEMP - secure hardware enhancement for MyProxy
    • Marchesini, J.1    Smith, S.2
  • 27
    • 35348997291 scopus 로고    scopus 로고
    • Open Grid Forum. Overview of the GSI. .
  • 28
    • 35348985833 scopus 로고    scopus 로고
    • OpenTC. Available from: .
  • 29
    • 1142270162 scopus 로고    scopus 로고
    • Pearson S. (Ed), Prentice Hall
    • In: Pearson S. (Ed). Trusted computing platforms (2003), Prentice Hall
    • (2003) Trusted computing platforms
  • 32
    • 35348957732 scopus 로고    scopus 로고
    • The trusted computing platform emerging as industry's first comprehensive approach to IT security
    • Rau S. The trusted computing platform emerging as industry's first comprehensive approach to IT security. IDC Executive Brief (February 2006). Available from:
    • (2006) IDC Executive Brief
    • Rau, S.1
  • 33
    • 35348944329 scopus 로고    scopus 로고
    • Sadeghi A-R, Stüble C. Property-based attestation for computing platforms: caring about properties, not mechanisms. In: New Security Paradigm Workshop (NSPW); 2004.
  • 34
    • 14844291531 scopus 로고    scopus 로고
    • Sailer Reiner, Jaeger Trent, Zhang Xiaolan, van Doorn Leendert. Attestation-based policy enforcement for remote access. In: ACM conference on computer and communications security; 2004a. p. 308-17.
  • 35
    • 85084162270 scopus 로고    scopus 로고
    • Sailer R, Zhang X, Jaeger T, van Doorn L. Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX security symposium; 2004b. p. 223-38.
  • 36
    • 77955001308 scopus 로고    scopus 로고
    • John Linwood Griffin and Stefan Berger. sHype: a secure hypervisor approach to trusted virtualized systems
    • Sailer R., Valdez E., Jaeger T., Perez R., and van Doorn L. John Linwood Griffin and Stefan Berger. sHype: a secure hypervisor approach to trusted virtualized systems. IBM Res Rep (2005)
    • (2005) IBM Res Rep
    • Sailer, R.1    Valdez, E.2    Jaeger, T.3    Perez, R.4    van Doorn, L.5
  • 37
    • 35348964005 scopus 로고    scopus 로고
    • Sailer R, Valdez E, Jaeger T, Perez R, van Doorn L, Griffin JL, et al. sHype: secure hypervisor approach to trusted virtualized systems. Technical Report RC23511, Yorktown Heights, NY: IBM TJ Watson Research Center; February 2005b.
  • 38
    • 30144435491 scopus 로고    scopus 로고
    • Sandhu Ravi, Zhang Xinwen. Peer-to-peer access control architecture using trusted computing technology. In: Proceedings of the 10th ACM symposium on access control models and technologies (SACMAT), Stockholm; 2005. p. 147-58.
  • 42
    • 84885633990 scopus 로고    scopus 로고
    • Shieh A, Williams D, Sirer E, Schneider F. Nexus: a new operating system for trustworthy computing. In: Proceedings of the 20th ACM symposium on operating systems principles, WIP Session; 2005. p. 1-9.
  • 43
    • 1142280988 scopus 로고    scopus 로고
    • Suh G, Clarke D, Gassend B, van Dijk M, Devadas S. AEGIS: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th annual international conference on supercomputing; 2003a. p. 160-71.
  • 44
    • 84944412608 scopus 로고    scopus 로고
    • Suh GE, Clarke D, Gassend B, van Dijk M, Devadas S. Efficient memory integrity verification and encryption for secure processors. In: Proc. annual IEEE/ACM international symposium on microarchitecture (MICRO); 2003b. p. 339-50.
  • 45
    • 35348980631 scopus 로고    scopus 로고
    • TrouSerS. The open-source TCG Software Stack. .
  • 46
    • 35349009476 scopus 로고    scopus 로고
    • Trusted Computing Group. Available from: .
  • 49
    • 35349031548 scopus 로고    scopus 로고
    • The VMware software package. Available from: .
  • 50
    • 35349024704 scopus 로고    scopus 로고
    • Server Utilization. .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.