Legal Issues in Secure Grid Computing Environments

  • Irene Kafeza
  • Eleanna Kafeza
  • Felix Wai-Hon Chan


The Grid environment is rapidly emerging as the dominant paradigm for wide area distributed application systems. The world wide business demand for intense problem solving capabilities and grid computing makes it possible to share computing resources on an unprecedented scale among geographically distributed participants. In a grid environment virtual orgamsations are formulated and managed from a computing resource point of view. The grid provider allows for the dynamic discovery of computing resources, the immediate allocation and provision of the resources, the management and provision of secure access. Although the security problem in grid environment is being addressed from the technological point of view, there is no work to identify the myriad legal issues that are arising in grid business transactions.


Grid Node Service Level Agreement Legal Issue Virtual Organisation Grid Technology 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [EC-00]
    Directive 2000/31/EC on Electronic Commerce.Google Scholar
  2. [EC-02]
    Directive 2002/58/EC on Privacy and Electronic Communications.Google Scholar
  3. [EPPS-05]
    Elliot M., Pickles S., Purdam K., Smith D., Disclosure Risk and Grid Computing, Fifth All Hands Meeting, 18th-21st September 2006 Nottingham.Google Scholar
  4. [F-O5]
    Foster I., License to Grid, The Globus Consortium Journal, 7/2005.Google Scholar
  5. [F-98]
    Foster I., Kesselman C., Tsudik G., Tuecke S., A Security Architecture for Computational Grids. Proc. 5th ACM Conference on Computer and Communications Security Conference, pg. 83–92, 1998.Google Scholar
  6. [Ga-OS]
    Carver B., Share and Ahare Alike: Understanding and Enforcing Open Source and Free Software Licenses, Berkley Technology Law Journal, 20 Berkley Tech. L.J. 443, 2005.Google Scholar
  7. [GSW-04]
    Giburd B, Schuster A, Wolff R, K-TTP: A new privacy model for large scale distributed environments, KDD 2004, August 2004, Suattle, USA.Google Scholar
  8. [K-OS]
    Kesler J. C, Contractual and Regulatory Compliance Challenges in Grid Computing Environments, Proceedings of the 2005 IEEE International Conference on Services Computing, 2005.Google Scholar
  9. [KTB-OS]
    Kanaskar N, Topaloglu U., Bayrak C, Globus Security Model for Grid Environment, ACM SIGSOFT Software Engineering Notes, November 2005, 30, 6.Google Scholar
  10. [L-OO]
    Lloyd. J. Ian. Information Technology Law, Butterworths, 2000.Google Scholar
  11. [M-03]
    Madison M., Rights and the Shape of the Internet, Boston College Law School, 44 B.C.L. Rev 433,2003.Google Scholar
  12. [N-OS]
    Nimmer R., Introduction: Issues in licensing an introduction, Houston Law Review, 42 Hous. L. Rev. 941, 2005.Google Scholar
  13. [Z-06]
    Zittrain J., The Generative Internet, The Harvard Law Review Association, 119 Harv. L. Rev. 1974, 2006.Google Scholar
  14. [KKC-O5]
    I. Kafeza, E. Kafeza, D. K. Chiu, Legal Aspects of Security in e-contracting with Electronic Agents, Sachar, P., Pohlmann, N., and Reimer, H. 2005 ISSE 2005 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2005 Conference. GWV-Vieweg.Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden 2006

Authors and Affiliations

  • Irene Kafeza
  • Eleanna Kafeza
    • 1
  • Felix Wai-Hon Chan
    • 2
  1. 1.Department of Marketing and CommunicationAthens University of Economics and BusinessAthens
  2. 2.The University of Hong Kong, Faculty of LawHong Kong

Personalised recommendations