Font Size: a A A

A Grid Security Requirement Analysis Model Based On Roles And Tasks

Posted on:2007-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhaoFull Text:PDF
GTID:2178360212957542Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Grid is an integrated computing and resource infrastructure that implements distributed resource coordinative operations and guarantees a certain level of QoS to users based on standardized, open and common protocols and interfaces. Multi-user coordinative computing in grid environment is an important research field. With the development of grid applications, higher system reliability is required. security protocol is an important method for maintenance of system security in grid environment, which has security requirements including authentication, authorization, revoke of certificates, confidentiality, distributed trust, integrity and non-repudiation. Security model is based on system security requirements which provide specification for system security requirements and logic structure of security architecture. Modern security system design is very concerned with the building of security model and traditional security model is not adapt to the multi-user coordinative computing in grid environment.This paper proposes a multi-user coordinative relationship specification model TRBCR based on roles and tasks for grid computing. Additionally, a grid security requirement analysis model TRBCC(based on that) is defined to provide formal security requirement specifications so that different security requirements are unified into one single theory architecture for multi-user coordinative computing in grid environment.In this paper, the notion of grid computing channel is introduced and a formal method based on the traditional Strand Space theory is defined to provide analysis and verification for grid security protocols of multi-user coordinative computing in grid environment. The difference between TRBCC model and traditional security model is demonstrated by an example in which multi-VO coordinative computing process is build up and the formal specification of multi-user coordinative computing requirements is performed by the TRBCC model. Additionally, authentication protocol in the multi-VO coordinative computing environment is verified by the extended Strand Space theory in the example.
Keywords/Search Tags:Grid, Coordinative Computing, Security Model, Security Protocol, Formal Analysis
PDF Full Text Request
Related items