Securing Grid Workflows with Trusted Computing. / Yau, Po-Wah; Tomlinson, Allan; Balfe, Shane; Gallery, Eimear.

2008. 510-519.

Research output: Contribution to conferencePaper

Published

Standard

Securing Grid Workflows with Trusted Computing. / Yau, Po-Wah; Tomlinson, Allan; Balfe, Shane; Gallery, Eimear.

2008. 510-519.

Research output: Contribution to conferencePaper

Harvard

APA

Vancouver

Author

BibTeX

@conference{413bf96fdbc04266ad21db9675a9a18f,
title = "Securing Grid Workflows with Trusted Computing",
abstract = "We propose a novel scheme that uses Trusted Computing technology to secure Grid workflows. This scheme allows the selection of trustworthy resource providers based on their platform states. The integrity and confidentiality of workflow jobs are provided using cryptographic keys that can only be accessed when resource provider platforms are in trustworthy states. In addition, platform attestation is used to detect potential workflow execution problems, and the information collected can be used for process provenance.",
author = "Po-Wah Yau and Allan Tomlinson and Shane Balfe and Eimear Gallery",
year = "2008",
month = jun,
day = "1",
language = "Undefined/Unknown",
pages = "510--519",

}

RIS

TY - CONF

T1 - Securing Grid Workflows with Trusted Computing

AU - Yau, Po-Wah

AU - Tomlinson, Allan

AU - Balfe, Shane

AU - Gallery, Eimear

PY - 2008/6/1

Y1 - 2008/6/1

N2 - We propose a novel scheme that uses Trusted Computing technology to secure Grid workflows. This scheme allows the selection of trustworthy resource providers based on their platform states. The integrity and confidentiality of workflow jobs are provided using cryptographic keys that can only be accessed when resource provider platforms are in trustworthy states. In addition, platform attestation is used to detect potential workflow execution problems, and the information collected can be used for process provenance.

AB - We propose a novel scheme that uses Trusted Computing technology to secure Grid workflows. This scheme allows the selection of trustworthy resource providers based on their platform states. The integrity and confidentiality of workflow jobs are provided using cryptographic keys that can only be accessed when resource provider platforms are in trustworthy states. In addition, platform attestation is used to detect potential workflow execution problems, and the information collected can be used for process provenance.

M3 - Paper

SP - 510

EP - 519

ER -