Abstractions, accounts and grid usability

The vision of the Grid is one of seamless, virtual and constantly changing resources where users need not concern themselves about details, such as exactly where an application is running or where their data is being stored. However, seamless and virtual often imply a lack of control that users may be wary of, or even opposed to. Drawing upon our studies of HCI and of collaborative work, this paper examines whether the Grid development community should be taking this vision literally and argues for the need for accountability of systems ‘in interaction’. We give examples of an alternative approach that seeks to provide ways in which administrators, technical support and user communities can make sense of the behaviour of the complex socio-technical ensembles that are the reality of Grids.

[1]  Ian Foster,et al.  The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.

[2]  Diana K. Smetters,et al.  In search of usable security: five lessons from the field , 2004, IEEE Security & Privacy Magazine.

[3]  Andrew C. Simpson,et al.  Collaboration and Trust in Healthcare Innovation: The eDiaMoND Case Study , 2005, Computer Supported Cooperative Work (CSCW).

[4]  K. Knorr-Cetina,et al.  Epistemic cultures : how the sciences make knowledge , 1999 .

[5]  Paul Dourish,et al.  In the eye of the beholder: A visualization-based approach to information system security , 2005, Int. J. Hum. Comput. Stud..

[6]  John Bowers,et al.  The work to make a network work: studying CSCW in action , 1994, CSCW '94.

[7]  Stephen Farrell,et al.  Securely Available Credentials - Requirements , 2001, RFC.

[8]  Jadwiga Indulska,et al.  Balancing autonomy and user control in context-aware systems - a survey , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[9]  Paul Dourish,et al.  Where the action is , 2001 .

[10]  Yvonne Rogers,et al.  Ghosts in the network: distributed troubleshooting in a shared working environment , 1992, CSCW '92.

[11]  Jim Basney,et al.  The MyProxy online credential repository , 2005, Softw. Pract. Exp..

[12]  Thomas A. Corbi,et al.  The dawning of the autonomic computing era , 2003, IBM Syst. J..

[13]  Ami Marowka,et al.  The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..

[14]  Rob Procter,et al.  Improving Web Usability with the Link Lens , 1999, Comput. Networks.

[15]  Stuart Anderson,et al.  Making autonomic computing systems accountable: the problem of human computer interaction , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[16]  Jim Basney,et al.  Mechanisms for increasing the usability of grid security , 2005, Int. J. Hum. Comput. Stud..

[17]  Martina Angela Sasse,et al.  Why users compromise computer security mechanisms and how to take remedial measures. , 1999 .

[18]  Mike Just,et al.  Securely Available Credentials (SACRED) - Credential Server Framework , 2004, RFC.

[19]  Peter Gutmann,et al.  Plug-and-Play PKI: A PKI Your Mother Can Use , 2003, USENIX Security Symposium.