Abstract
We extend previous work on formalising design patterns to start the development of security patterns for Grid systems. We demonstrate the feasibility of our approach with a case study involving a deployed security architecture in a Grid Operating System called XtreemOS. A number of Grid security management capabilities that aid the secure settingup and running of a Grid are presented. We outline the functionality needed for such cases in a general form, which could be utilised when considering the development of similar large-scale systems in the future. We also specifically describe the use of authentication patterns that model the extension of trust from a secure core, and indicate how these patterns can be composed, specialised and instantiated.
| Original language | English |
|---|---|
| Title of host publication | 2014 IEEE 8th International Symposium on Service Oriented System Engineering |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 422-427 |
| Number of pages | 6 |
| ISBN (Electronic) | 978-1-4799-3616-8 |
| DOIs | |
| Publication status | Published - 12 Jun 2014 |
| Event | 2014 IEEE 8th International Symposium on Service Oriented System Engineering - Oxford, United Kingdom Duration: 7 Apr 2014 → 11 Apr 2014 |
Conference
| Conference | 2014 IEEE 8th International Symposium on Service Oriented System Engineering |
|---|---|
| Country/Territory | United Kingdom |
| City | Oxford |
| Period | 7/04/14 → 11/04/14 |
Keywords
- Security
- Patterns
- operating systems
- Grid Computing
Fingerprint
Dive into the research topics of 'Using security patterns for modelling security capabilities in a Grid OS'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver