Some New Security Strategies Description about Grid


Article Preview

The security strategy description is important contents of security access control research about grid. The strategy of traditional access control models has ignored the subject security, and can not be solved with the dynamic grid, and the characteristics of the coexistence of multiple security strategy etc problems. Regarding the concept of subject/ object decomposition and the organization classifications are defined, and the concepts of subject safe service, object safe service, and granularity control etc are expanded, Using the RBAC model and BLP the model basic principle, a group new access control security strategy based on the grid environment have be given in the paper. After discussion shows that the new rules emphasis on the subject security, and adapt to the dynamic nature of grid environment and characteristics of the coexistence of multiple security strategy. The new rules are compatibility with existing network access control model, they are secure and are also an expansion under the common network environment access control strategy, and this has certain positive significance to the grid security research.



Advanced Materials Research (Volumes 255-260)

Edited by:

Jingying Zhao




Y. H. Liu "Some New Security Strategies Description about Grid", Advanced Materials Research, Vols. 255-260, pp. 2296-2300, 2011

Online since:

May 2011





[1] Joshy Joseph, Craig Fellenstein . Grid comupte. Beijing: Tsinghua University publishing house(2005).

[2] ZHANG Yifan: Study on access controlbased on the grid security infrastructure. South central national university master's degree paper(2009), in Chinese.

[3] Welch V, Siebenlist F, Foster I: Proc 12th IEEE International Symposium on High Performance Distributed Computing. Seattle, WA, USA: IEEE Computer Society(2003), pp.48-57.

[4] ZHANG Dongli: Grid security certain question research-Based on proxy access control system plan. Shanghai Jiaotong University Master's degree paper(2005), in Chinese.

[5] MIN Rui: Grid safe access control engineering research . Hubei Industrial university master's degree paper(2008), in Chinese.

[6] Sandhu RS, Samarati P: IEEE communications Vol. 9(1994), pp.40-48.

[7] Bell D E, Lapadula LJ. Secure compter system: mathematical foundation. MTR-2527, Mitrecorp, Bedford, MA(1973).

[8] LIU yi-he: Model Research Based On Security Architecture Of Application Area Boundary. Sichuan university doctor's degree paper(2004), in Chinese.

[9] GUO rui-ming, LIU yi-he, DAI zong-kun: Journal of Si Chuan University (Engineering Science Edtion) Vol 40(2008), pp.610-614, in Chinese.

Fetching data from Crossref.
This may take some time to load.