Threat model for grid security services

14Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The grid computing paradigm involves both the availability of abundant computing resources, and the storage of increased amounts of valuable data. Such information systems heavily rely upon the provision of adequate security. It is imperative that techniques be developed to assure the trustworthiness of these environments. Formal verification provides the tools and techniques to assess whether systems are indeed trustworthy, and is an established approach for security assurance. When using formal verification for security assessment one of the most important concerns should be to be precise about the threat model. A comprehensive threat model is indispensable for the simulations of a grid security model. This article presents a survey of the various threat models and discusses how and when these threat models may be inappropriate for use in the grid computing environments. Then a fine-grained threat model for grid computing is presented. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Naqvi, S., & Riguidel, M. (2005). Threat model for grid security services. In Lecture Notes in Computer Science (Vol. 3470, pp. 1048–1055). Springer Verlag. https://doi.org/10.1007/11508380_107

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free