Trusting agents for grid computing

Justin R.D. Dyson, Nathan E. Griffiths, Hélène N.Lim Choi Keung, Stephen A. Jarvis, Graham R. Nudd

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Abstract

The Grid vision is to allow compute resources to be shared and utilised globally, with these distributed resources belonging to the same Virtual Organisation (VO). These resources execute jobs submitted by users, who are not in the resources' local domain and hence have no control over these resources. Conversely these users are not controlled by the resource owners. Certificates provide a common, useful security mechanism to overcome these barriers and set out access rights, but they do not guarantee that the resources, or users, can be trusted. This is due to the fact that resources and users may be unreliable; this situation may not be reflected in the users' perception of the reliability of the resource owner as a whole or vice versa. This paper describes a trust framework model for Grid computing, which enables users to execute their jobs on reliable and efficient resources, thereby satisfying clients' quality-of-service (QoS) requirements.

Original languageEnglish
Title of host publication2004 IEEE International Conference on Systems, Man and Cybernetics, SMC 2004
Pages3187-3192
Number of pages6
DOIs
Publication statusPublished - 2004
Event2004 IEEE International Conference on Systems, Man and Cybernetics, SMC 2004 - The Hague, Netherlands
Duration: 10 Oct 200413 Oct 2004

Publication series

NameConference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
Volume4
ISSN (Print)1062-922X

Conference

Conference2004 IEEE International Conference on Systems, Man and Cybernetics, SMC 2004
Country/TerritoryNetherlands
CityThe Hague
Period10/10/0413/10/04

Keywords

  • Agents
  • Grid
  • Resource Management
  • Security
  • Trust

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint

Dive into the research topics of 'Trusting agents for grid computing'. Together they form a unique fingerprint.

Cite this