Using security patterns for modelling security capabilities in a Grid OS

Benjamin Aziz, Clive Blackwell

Research output: Chapter in Book/Report/Conference proceedingConference contribution

168 Downloads (Pure)

Abstract

We extend previous work on formalising design patterns to start the development of security patterns for Grid systems. We demonstrate the feasibility of our approach with a case study involving a deployed security architecture in a Grid Operating System called XtreemOS. A number of Grid security management capabilities that aid the secure settingup and running of a Grid are presented. We outline the functionality needed for such cases in a general form, which could be utilised when considering the development of similar large-scale systems in the future. We also specifically describe the use of authentication patterns that model the extension of trust from a secure core, and indicate how these patterns can be composed, specialised and instantiated.
Original languageEnglish
Title of host publication2014 IEEE 8th International Symposium on Service Oriented System Engineering
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages422-427
Number of pages6
ISBN (Electronic)978-1-4799-3616-8
DOIs
Publication statusPublished - 12 Jun 2014
Event2014 IEEE 8th International Symposium on Service Oriented System Engineering - Oxford, United Kingdom
Duration: 7 Apr 201411 Apr 2014

Conference

Conference2014 IEEE 8th International Symposium on Service Oriented System Engineering
Country/TerritoryUnited Kingdom
CityOxford
Period7/04/1411/04/14

Keywords

  • Security
  • Patterns
  • operating systems
  • Grid Computing

Fingerprint

Dive into the research topics of 'Using security patterns for modelling security capabilities in a Grid OS'. Together they form a unique fingerprint.

Cite this