Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation. / Yau, Po-Wah; Tomlinson, Allan.

2009. 113 - 119.

Research output: Contribution to conferencePaperpeer-review

Published

Standard

Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation. / Yau, Po-Wah; Tomlinson, Allan.

2009. 113 - 119.

Research output: Contribution to conferencePaperpeer-review

Harvard

APA

Vancouver

Author

BibTeX

@conference{b563e3b8d46b45e89feb90f6aaa49e90,
title = "Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation",
abstract = "Abstract — This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged into a logical order to process a Grid user{\textquoteright}s dataset. An overview of a secure protocol using Trusted Computing technology is provided, which is further enhanced with platform virtualisation hardware and software. The proposed scheme allows the selection of trustworthy resource providers and gives confidentiality and integrity protection to the workflow, the Grid user{\textquoteright}s processes and data. The scheme also detects any problems during workflow execution, collecting information that can be used for process provenance.",
author = "Po-Wah Yau and Allan Tomlinson",
year = "2009",
language = "English",
pages = "113 -- 119",

}

RIS

TY - CONF

T1 - Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation

AU - Yau, Po-Wah

AU - Tomlinson, Allan

PY - 2009

Y1 - 2009

N2 - Abstract — This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged into a logical order to process a Grid user’s dataset. An overview of a secure protocol using Trusted Computing technology is provided, which is further enhanced with platform virtualisation hardware and software. The proposed scheme allows the selection of trustworthy resource providers and gives confidentiality and integrity protection to the workflow, the Grid user’s processes and data. The scheme also detects any problems during workflow execution, collecting information that can be used for process provenance.

AB - Abstract — This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged into a logical order to process a Grid user’s dataset. An overview of a secure protocol using Trusted Computing technology is provided, which is further enhanced with platform virtualisation hardware and software. The proposed scheme allows the selection of trustworthy resource providers and gives confidentiality and integrity protection to the workflow, the Grid user’s processes and data. The scheme also detects any problems during workflow execution, collecting information that can be used for process provenance.

M3 - Paper

SP - 113

EP - 119

ER -