메뉴 건너뛰기




Volumn 5087 LNCS, Issue , 2009, Pages 132-149

Innovations for Grid security from trusted computing: Protocol solutions to sharing of security resource

Author keywords

Behavior Conformation; Grid Computing; Grid Security; Remote Platform Attestation; Secure Multi party Computation; Secure Virtualization; Trusted Computing (TC); Trusted Computing Group (TCG)

Indexed keywords

BEHAVIOR CONFORMATION; PLATFORM ATTESTATION; SECURE MULTI-PARTY COMPUTATION; TRUSTED COMPUTING; TRUSTED COMPUTING (TC); TRUSTED COMPUTING GROUPS; VIRTUALIZATIONS;

EID: 71549130410     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04904-0_18     Document Type: Conference Paper
Times cited : (5)

References (31)
  • 1
    • 35048883832 scopus 로고    scopus 로고
    • VOMS, an authorization system for virtual organizations
    • Fernández Rivera, F, Bubak, M, Gómez Tato, A, Doallo, R, eds, Across Grids 2003, Springer, Heidelberg
    • Alfieri, R., Cecchini, R.L., Ciaschini, V., dell'Agnello, L., Frohner, A., Gianoli, A., Lõrentey, K., Spataro, F.: VOMS, an authorization system for virtual organizations. In: Fernández Rivera, F., Bubak, M., Gómez Tato, A., Doallo, R. (eds.) Across Grids 2003. LNCS, vol. 2970, pp. 33-40. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2970 , pp. 33-40
    • Alfieri, R.1    Cecchini, R.L.2    Ciaschini, V.3    dell'Agnello, L.4    Frohner, A.5    Gianoli, A.6    Lõrentey, K.7    Spataro, F.8
  • 4
    • 85008038596 scopus 로고    scopus 로고
    • Improving the TCPA specification
    • Arbaugh, B.: Improving the TCPA specification. IEEE Computer, 77-79 (2002)
    • (2002) IEEE Computer , vol.77-79
    • Arbaugh, B.1
  • 5
    • 0002762440 scopus 로고    scopus 로고
    • RBAC policies in XML for X.509 based privilege management
    • Chadwick, D.W.: RBAC policies in XML for X.509 based privilege management. In: Proceedings of SEC 2002 (2002)
    • (2002) Proceedings of SEC
    • Chadwick, D.W.1
  • 7
    • 84926427148 scopus 로고
    • Survey of virtual machine research
    • Goldberg, R.: Survey of virtual machine research. IEEE Computer Magazine 7, 34-45 (1974)
    • (1974) IEEE Computer Magazine , vol.7 , pp. 34-45
    • Goldberg, R.1
  • 8
    • 71549160609 scopus 로고    scopus 로고
    • Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation - a virtual machine directed approach to trusted computing. In: VM 2004. USENIX (2004)
    • Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation - a virtual machine directed approach to trusted computing. In: VM 2004. USENIX (2004)
  • 9
    • 21644470487 scopus 로고    scopus 로고
    • Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear
    • Technical Report TR2003-476, Department of Computer Science, Dartmouth College, Hanover, New Hampshire December
    • Marchesini, J., Smith, S., Wild, O., MacDonald, R.: Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear. Technical Report TR2003-476, Department of Computer Science, Dartmouth College, Hanover, New Hampshire (December 2003)
    • (2003)
    • Marchesini, J.1    Smith, S.2    Wild, O.3    MacDonald, R.4
  • 10
    • 71549118638 scopus 로고    scopus 로고
    • Grids and Private Networks are Antithetical
    • Chivers, H, Martin, A, eds, Oxford, UK July
    • Martin, A., Cook, C.: Grids and Private Networks are Antithetical. In: Chivers, H., Martin, A. (eds.) Workshop on Grid Security Practice and Experience, Oxford, UK (July 2004)
    • (2004) Workshop on Grid Security Practice and Experience
    • Martin, A.1    Cook, C.2
  • 13
    • 71549156354 scopus 로고    scopus 로고
    • Stainforth, D., Martin, A., Simpson, A., Christensen, C., Kettleborough, J., Aina, T., Allen, M.: Security principles for public-resource modelling research. In: IASTED (2002)
    • Stainforth, D., Martin, A., Simpson, A., Christensen, C., Kettleborough, J., Aina, T., Allen, M.: Security principles for public-resource modelling research. In: IASTED (2002)
  • 15
    • 71549138170 scopus 로고    scopus 로고
    • Bair, R. (ed.), Agarwal, D., et. al (contributors): National Collaboratories Horizons, Report of the August 10-12, National Collaboratories Program Meeting, the U.S. Department of Energy Office of Science (2004)
    • Bair, R. (ed.), Agarwal, D., et. al (contributors): National Collaboratories Horizons, Report of the August 10-12, National Collaboratories Program Meeting, the U.S. Department of Energy Office of Science (2004)
  • 16
    • 71549126638 scopus 로고    scopus 로고
    • Bellovin, S.: Distributed Firewalls. In: login: pp. 39-47 (November 1999)
    • Bellovin, S.: Distributed Firewalls. In: login: pp. 39-47 (November 1999)
  • 21
    • 71549159838 scopus 로고    scopus 로고
    • Freier, A.O, Karlton, P, Kocher, P.C, The SSL Protocol, Version 3.0. INTERNET-DRAFT, draft-freier-ssl-version3-02.txt November 1996
    • Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol, Version 3.0. INTERNET-DRAFT, draft-freier-ssl-version3-02.txt (November 1996)
  • 22
    • 10044237459 scopus 로고    scopus 로고
    • Globus Toolkit, http://www-unix.globus.org/toolkit/
    • Globus Toolkit
  • 23
    • 71549148806 scopus 로고    scopus 로고
    • ITU-T.Rec. X.509 (revised) the Directory - Authentication Framework. International Telecommunication Union, Geneva, Switzerland (equivalent to ISO/IEC 9594-8:1995) (1993)
    • ITU-T.Rec. X.509 (revised) the Directory - Authentication Framework. International Telecommunication Union, Geneva, Switzerland (equivalent to ISO/IEC 9594-8:1995) (1993)
  • 26
    • 71549151104 scopus 로고    scopus 로고
    • RSA Security. PKCS#11 v2.20: Cryptographic Token Interface Standard. June 28 (2004), http://www.rsasecurity.com/pub/pkcs/pkcs-11/v2-20/pkcs-11v2-20.pdf
    • RSA Security. PKCS#11 v2.20: Cryptographic Token Interface Standard. June 28 (2004), http://www.rsasecurity.com/pub/pkcs/pkcs-11/v2-20/pkcs-11v2-20.pdf
  • 27
    • 71549121459 scopus 로고    scopus 로고
    • http://www.serverwatch.com/
  • 29
    • 71549158010 scopus 로고    scopus 로고
    • http://www.trustedcomputinggroup.org


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.