Innovations for Grid Security from Trusted Computing

Bruno Crispo: But why do you need to chain the certificates, I don't understand. Usually I look for, for example, storage, and then I go find somewhere that can provide the storage I need, but why do I need a chain? Reply: Do you mean, you do it yourself?

[1]  Tal Garfinkel,et al.  Flexible OS Support and Applications for Trusted Computing , 2003, HotOS.

[2]  Andrew Martin,et al.  Grids and Private Networks are Anthitetical , 2004 .

[3]  Ian T. Foster,et al.  The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..

[4]  Ian Foster,et al.  The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.

[5]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[6]  David W. Chadwick,et al.  RBAC Policies in XML for X.509 Based Privilege Management , 2002, SEC.

[7]  David P. Anderson,et al.  BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.

[8]  Marvin Theimer,et al.  Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.

[9]  Rajkumar Buyya,et al.  Fifth IEEE/ACM International Workshop on Grid Computing : 8 November 2004, Pittsburgh, PA : proceedings , 2004 .

[10]  Sean W. Smith,et al.  Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear , 2003 .

[11]  Steven Tuecke,et al.  An online credential repository for the Grid: MyProxy , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[12]  Srilekha Mudumbai,et al.  Certificate-based authorization policy in a PKI environment , 2003, TSEC.

[13]  William A. Arbaugh,et al.  Improving the TCPA Specification , 2002, Computer.

[14]  Dave Stainforth,et al.  Security principles for public-resource modeling research , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[15]  Robert P. Goldberg,et al.  Survey of virtual machine research , 1974, Computer.

[16]  Ian T. Foster,et al.  A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[17]  Michael Franz,et al.  Semantic remote attestation: a virtual machine directed approach to trusted computing , 2004 .

[18]  Ákos Frohner,et al.  VOMS, an Authorization System for Virtual Organizations , 2003, European Across Grids Conference.

[19]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[20]  David P. Anderson,et al.  SETI@home-massively distributed computing for SETI , 2001, Comput. Sci. Eng..

[21]  Leonard A. Smith,et al.  Uncertainty in predictions of the climate response to rising levels of greenhouse gases , 2005, Nature.