Towards Dynamic Authentication in the Grid — Secure and Mobile Business Workflows Using GSet

DOI: 10.1007/978-3-7643-8899-7_6 In book: Economic Models and Algorithms for Distributed Systems, pp.83-104


Until now, the research community mainly focused on the technical aspects of Grid computing and neglected commercial issues.
However, recently the community tends to accept that the success of the Grid is crucially based on commercial exploitation.
In our vision Foster’s and Kesselman’s statement “The Grid is all about sharing.” has to be extended by “... and making money
out of it!”. To allow for the realization of this vision the trust-worthyness of the underlying technology needs to be ensured.
This can be achieved by the use of gSET (Gridified Secure Electronic Transaction) as a basic technology for trust management
and secure accounting in the presented Grid based workflow. We present a framework, conceptually and technically, from the
area of the Mobile-Grid, which justifies the Grid infrastructure as a viable platform to enable commercially successful business

Mathematics Subject Classification (2000)Primary 91A40-68M14-68T99-Secondary 91A10
KeywordsGrid computing-virtual organization-self organization-cooperative game theory

1 Follower
9 Reads
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: With the growth of system scale, it has become very difficult problem that how to ensure the security of service in grid. In order to resolve this problem, we propose an auditing mechanism for the security of service in grid. In the auditing mechanism, we first define and analyze some atomic services for grid application which are based on the service processes of task. Then, we propose some detecting methods for these automatic services. At last, we propose an auditing model for the security of service. In order to justify the feasibility and the availability of the auditing mechanism, a series of experiments have been done. The results show that it is feasible to ensure the security of service in grid.
    Full-text · Conference Paper · Jan 2013