Michael Engel | TU Dortmund (original) (raw)
Papers by Michael Engel
Journal of Parallel and …, Jan 1, 2006
In this paper, an analysis of security threats within service-oriented on-demand Grid computing e... more In this paper, an analysis of security threats within service-oriented on-demand Grid computing environments is presented. The analysis is based on identifying three levels of trust relationships and three types of Grid applications in on-demand computing; the trust relationships involve interactions among resource providers, middleware producers, solution producers, and users. The paper presents solutions for addressing the threats inherent to these three increasingly demanding levels. The solutions involve applying sandbox-based approaches using virtual machine technology and jailing mechanisms to ensure trust for the first two levels of on-demand Grid computing, as well as Trusted Computing Platform Alliance (TCPA) technology for the third level of on-demand Grid computing. A brief taxonomy of the presented solutions is introduced.
Proceedings of the 4th international conference …, Jan 1, 2005
... 4. APPLICATION EXAMPLES In this section, four examples implementing basic auto-nomic computin... more ... 4. APPLICATION EXAMPLES In this section, four examples implementing basic auto-nomic computing functionality, each providing support for one self-principleusing dynamic aspects are presented. 4.1 Self-Configuration ...
Journal of Parallel and …, Jan 1, 2006
In this paper, an analysis of security threats within service-oriented on-demand Grid computing e... more In this paper, an analysis of security threats within service-oriented on-demand Grid computing environments is presented. The analysis is based on identifying three levels of trust relationships and three types of Grid applications in on-demand computing; the trust relationships involve interactions among resource providers, middleware producers, solution producers, and users. The paper presents solutions for addressing the threats inherent to these three increasingly demanding levels. The solutions involve applying sandbox-based approaches using virtual machine technology and jailing mechanisms to ensure trust for the first two levels of on-demand Grid computing, as well as Trusted Computing Platform Alliance (TCPA) technology for the third level of on-demand Grid computing. A brief taxonomy of the presented solutions is introduced.
Proceedings of the 4th international conference …, Jan 1, 2005
... 4. APPLICATION EXAMPLES In this section, four examples implementing basic auto-nomic computin... more ... 4. APPLICATION EXAMPLES In this section, four examples implementing basic auto-nomic computing functionality, each providing support for one self-principleusing dynamic aspects are presented. 4.1 Self-Configuration ...