The vision of the Grid is to provide a computational infrastructure supporting flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources. The Grid involves access to computer systems and data outside one's own company or institution. Security is therefore a major element in any Grid infrastructure, as it is necessary to ensure that only authorised access is permitted. The early development of the Grid also largely failed to take account of operational realities such as network administrator responsibilities and network devices such as firewalls. We believe that the peer-to-peer community is also likely to face similar conflicts between its decentralized management approach and the day-to-day concerns of those entrusted to maintain our security. We have found that it is necessary to develop a radical solution to some of these problems, including "proxy-free" delegation models and semantically-aware firewalls. The challenge for computer system developers and operators is to allow legitimate users to go about their business, while preventing unauthorised users from perpetrating these various types of abuse.
[1]
M Surridge,et al.
A Rough Guide to Grid Security
,
2002
.
[2]
Bruce Schneier,et al.
Secrets and Lies: Digital Security in a Networked World
,
2000
.
[3]
Erik Christensen,et al.
WSDL: Web Service Description Language
,
2001
.
[4]
Roy T. Fielding,et al.
Hypertext Transfer Protocol - HTTP/1.1
,
1997,
RFC.
[5]
Jean Jacques Moreau,et al.
SOAP Version 1. 2 Part 1: Messaging Framework
,
2003
.
[6]
Ian T. Foster,et al.
Globus: a Metacomputing Infrastructure Toolkit
,
1997,
Int. J. High Perform. Comput. Appl..
[7]
Ian T. Foster,et al.
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
,
2001,
Int. J. High Perform. Comput. Appl..
[8]
Volker Roth,et al.
Empowering Mobile Software Agents
,
2002,
Mobile Agents.