BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//talks.cam.ac.uk//v3//EN
BEGIN:VTIMEZONE
TZID:Europe/London
BEGIN:DAYLIGHT
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
TZNAME:BST
DTSTART:19700329T010000
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=-1SU
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
TZNAME:GMT
DTSTART:19701025T020000
RRULE:FREQ=YEARLY;BYMONTH=10;BYDAY=-1SU
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
CATEGORIES:Computer Laboratory Security Seminar
SUMMARY:Daonity - Grid security with behaviour conformity 
 from Trusted Computing - &lt\;a href='http://www.h
 pl.hp.com/personal/wm/'&gt\;Wenbo Mao&lt\;/a&gt\;\
 , HP Labs\, China
DTSTART;TZID=Europe/London:20060929T161500
DTEND;TZID=Europe/London:20060929T171500
UID:TALK5475AThttp://talks.cam.ac.uk
URL:http://talks.cam.ac.uk/talk/index/5475
DESCRIPTION:A central security requirement for grid computing 
 can be referred to as behaviour conformity. This i
 s an assurance that ad hoc related principals (use
 rs\, platforms or instruments) forming a grid virt
 ual organisation (VO) must each act in conformity 
 with the rules for the VO constitution. Existing g
 rid security practice has little means to enforce 
 behaviour conformity and consequently falls short 
 of satisfactory solutions to a number of problems.
 \n\nTrusted Computing (TC) technology can add to g
 rid computing the needed property of behaviour con
 formity. With TC using an essentially in-platform 
 (trusted) third party\, a principal can be imposed
  to have conformed behaviour and this fact can be 
 reported to interested parties who may only need t
 o be ad hoc related to the former. In this talk we
  report Daonity\, a TC enabled emerging work in gr
 id security standard\, to manifest how behaviour c
 onformity can help to improve grid security. 
LOCATION:Lecture Theatre 2\, Computer Laboratory\, William 
 Gates Building
CONTACT:Saar Drimer
END:VEVENT
END:VCALENDAR
