2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02)
DOI: 10.1109/ccgrid.2002.1017189
|View full text |Cite
|
Sign up to set email alerts
|

Towards Trust-Aware Resource Management in Grid Computing Systems

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
71
0

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 126 publications
(71 citation statements)
references
References 13 publications
0
71
0
Order By: Relevance
“…The proposed model is based on the trust model proposed by Azzedin and Maheswaran [1]- [5]. They measured the performance of Grid system by applying their trust model in a resource management system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed model is based on the trust model proposed by Azzedin and Maheswaran [1]- [5]. They measured the performance of Grid system by applying their trust model in a resource management system.…”
Section: Introductionmentioning
confidence: 99%
“…Trust [1]- [3] is the firm belief in the competence of an entity to act as expected such that this firm belief is not a fixed value associated with the entity but rather it is subject to the entity's behavior and applies only within a specific context at a given time. Trust management (TM) is collecting, codifying, analyzing, and evaluating evidence relating to competence, honesty, security, or dependability with the purpose of making assessments and decisions regarding trust relationships [9].…”
Section: Introductionmentioning
confidence: 99%
“…More importantly, our study differs from that of Abdelzaher and Shin in that the goal of our algorithms is to maximize the overall quality of security (measured by security value) and guarantee ratio by dynamically changing each accepted task's security levels. Azzedin and Maheswaran examined the integration of the notion of "trust" into resource management of a largescale wide-area system such as the Grid [7]. They argued that there is a "trust relationship" between a resource provider (RP) and a resource consumer (RC).…”
Section: Related Workmentioning
confidence: 99%
“…The hypothesis is that if the RMS (Resource Manage System) is aware of the security requirements of the resources and tasks it can perform the allocations such that the security overhead can be minimized. However, the allocation algorithm presented in [7] is developed in the context of non-real-time applications, and it is not suitable for realtime systems where tasks' deadlines have to be factored in.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, even the regular hardware may not be trusted and special security hardware may be necessary. Reference [28] suggests a mechanism for determining trust in a Grid environment. This is an area for future research to decide how much security is needed, how to provide it, and how to verify its correct operation.…”
Section: Mutual Distrustmentioning
confidence: 99%