Abstract
We extend previous work on formalising design patterns to start the development of security patterns for Grid systems. We demonstrate the feasibility of our approach with a case study involving a deployed security architecture in a Grid Operating System called XtreemOS. A number of Grid security management capabilities that aid the secure settingup and running of a Grid are presented. We outline the functionality needed for such cases in a general form, which could be utilised when considering the development of similar large-scale systems in the future. We also specifically describe the use of authentication patterns that model the extension of trust from a secure core, and indicate how these patterns can be composed, specialised and instantiated.
Original language | English |
---|---|
Title of host publication | 2014 IEEE 8th International Symposium on Service Oriented System Engineering |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 422-427 |
Number of pages | 6 |
ISBN (Electronic) | 978-1-4799-3616-8 |
DOIs | |
Publication status | Published - 12 Jun 2014 |
Event | 2014 IEEE 8th International Symposium on Service Oriented System Engineering - Oxford, United Kingdom Duration: 7 Apr 2014 → 11 Apr 2014 |
Conference
Conference | 2014 IEEE 8th International Symposium on Service Oriented System Engineering |
---|---|
Country/Territory | United Kingdom |
City | Oxford |
Period | 7/04/14 → 11/04/14 |
Keywords
- Security
- Patterns
- operating systems
- Grid Computing