|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Daonity - Grid security with behaviour conformity from Trusted Computing
If you have a question about this talk, please contact Saar Drimer.
A central security requirement for grid computing can be referred to as behaviour conformity. This is an assurance that ad hoc related principals (users, platforms or instruments) forming a grid virtual organisation (VO) must each act in conformity with the rules for the VO constitution. Existing grid security practice has little means to enforce behaviour conformity and consequently falls short of satisfactory solutions to a number of problems.
Trusted Computing (TC) technology can add to grid computing the needed property of behaviour conformity. With TC using an essentially in-platform (trusted) third party, a principal can be imposed to have conformed behaviour and this fact can be reported to interested parties who may only need to be ad hoc related to the former. In this talk we report Daonity, a TC enabled emerging work in grid security standard, to manifest how behaviour conformity can help to improve grid security.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsCSSA-Cambridge Rethinking the Crisis - The case for a Pluralist approach to Economics Heffers Bookshop events 2009
Other talksThe Piketty opportunity: inequality, global comparisons and a new agenda for economic history Dementia Inpatient Study on The Recognition and Evaluation of Signs Signalling Emotional Distress - The DISTRESSED Study From Pixels to Cats and Dogs: Vision in Humans and Computers Topfitter Motility and Invasion of apicomplexan parasites: What do we know? Highlights from the 2016 European Guidelines of CVD prevention: What is new?