Skip to main content

Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes

  • Conference paper
Information Security Applications (WISA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2908))

Included in the following conference series:

Abstract

With the rapid development of the global information infrastructure, the use of virtual organization (VO) is gaining increasing importance as a model for studying business and organizational structures. The notion of VO is significant in that it could serve as a basic framework for implementing geographically distributed, cross-organizational application systems in a highly flexible manner. To further enhance the pervasiveness of VO, it is of great importance that participation of mobile computing nodes be supported. Thus, security is a critical issue due to the open nature of the wireless channels that provide connectivity to mobile devices. This paper discusses, from an application angle, the importance of supporting mobile devices in VO. It also discusses the design of security infrastructures that support mobile nodes in mission-specific applications. A simple grid security infrastructure that supports participation of mobile computing nodes is also proposed to illustrate the implementation feasibility of the infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: enabling scalable virtual organizations. Int. J. Supercomputer Applications 15(3), 200–222 (2001)

    Article  Google Scholar 

  2. Anckar, B., D’Incau, D.: Value creation in mobile commerce: Findings from a consumer survey. Journal of Information Technology Theory & Application 4(1) (2002)

    Google Scholar 

  3. Parson, K., Schaeffler, J.: U.S. wireless phone penetration climbs. Wireless Insider (October 2001)

    Google Scholar 

  4. Sean, G.: Networking in the palm of your hand. Network Computing 13(16) (August 2002)

    Google Scholar 

  5. Foster, I., Kesselman, C.: Globus: A Metacomputing Infrastructure Toolkit. International Journal of Supercomputer Applications 11(2) (1997)

    Google Scholar 

  6. Tapscott, D., Ticoll, D., Lowy, A.: The rise of business web. Ubiquity 1(3) (March 2000)

    Google Scholar 

  7. “Dengue fever prevention and control”, Weekly Epidemiological Record 77(6), 41–48 (August 2002)

    Google Scholar 

  8. “Overview of the Grid Security Infrastructure”, at http://www-fp.globus.org/security/overview.html

  9. Zhou, J.Y., Lam, K.Y.: Securing digital signatures for non-repudiation. Journal of Computer Communications 22(8), 710–716 (1999)

    Article  Google Scholar 

  10. Internet Engineering Task Force. “Transport Layer Security (TLS)”, http://www.ietf.org/html.charters/tls-charter.html

  11. The Open Mobile Alliance Ltd, “Wireless Application Protocol”, http://www.wapforum.org

  12. ISO/IEC DIS 9798-3. “Information technology, security techniques, entity authentication, Part 3: mechanisms using digital signature techniques (Second Edition)”, ISO/IEC (1998)

    Google Scholar 

  13. Lam, K.Y.: Building an Authentication Service for Distributed Systems. Journal of Computer Security 2(1), IOS (Amsterdam) (1993)

    Google Scholar 

  14. Lam, K.Y., Gollmann, D.: Freshness Assurance of Authentication Protocols. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol. 648, Springer, Heidelberg (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lam, KY., Zhao, XB., Chung, SL., Gu, M., Sun, JG. (2004). Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. In: Chae, KJ., Yung, M. (eds) Information Security Applications. WISA 2003. Lecture Notes in Computer Science, vol 2908. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24591-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24591-9_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20827-3

  • Online ISBN: 978-3-540-24591-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics