Font Size: a A A

Trust Mechanism Of Cooperative Computing For Multi-users In Grid

Posted on:2007-07-01Degree:MasterType:Thesis
Country:ChinaCandidate:X N MaFull Text:PDF
GTID:2178360212480036Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Grid will become the next generation internet. Security is a key issue for the development of Grid. Because security in Grid is more complicated than that in general security problems, we have to do creative research and design, based on traditional security theories and techniques. The research on security problem in Grid is a complicated and tough work.This thesis is a part of the Country Natural Science Fund item"Security Mechanism of Cooperative Computing for Multi-users in Grid". The trust mechanism of cooperative computing for multi-users in Grid is studied in this thesis.Trust includes identity trust and behavior trust. In this thesis, authentication mechanism is introduced to resolve the identity trust problem. We construct an authentication model for cooperative computing for multi-users in Grid. This model can be integreted into the current authentication system in Grid and it has a good compatibility with the current authentication system in Grid.To resolve the behavior trust problem, a double-layer trust model that includes direct trust and commendatory trust is designed, consulted with the means that people build the trust relationship in true life. Cooperative computing domain is the main part, and other domains provide datum that are used to initialize trust values. Domain supervisor of cooperative computing domain manages users'commendatory trust in the domain; each user himself maintains the direct trust with regard to the other users in the domain. In addition, the computation method of trust is improved.Access control has close relationship with trust. In this thesis, the traditional access control techonique is improved. We add the trust in access control mechanism. User's identity and trust are referred as the parameters in access control, which overcomes the weakness in traditional access control techenique.
Keywords/Search Tags:Grid, Coopertive Computing, Identity Trust, Behavior Trust, Access Control
PDF Full Text Request
Related items