The effects of security choices and limits in a metacomputing environment
Abstract
It is anticipated that the introduction of metacomputing and distributed resource management mechanisms to the Internet and World Wide Web will make available to users and applications a large diversity of previously unavailable network and computing resources. New methods of managing the scheduling and allocation of distributed resources bring into focus new problems and approaches for managing security in those contexts. We present an analysis layered and variable security services and requirements. These services and requirements may be accessed via a network control program such as a Resource Management System (RMS) which is responsible for scheduling resources in distributed heterogeneous environments. The RMS will not present the same "virtual computer/network" to the same job each time it is submitted for execution. Each instance will be comprised of potentially different actual resources with different properties. Our objective is to understand how user and application requirements, characterized as choices and limits, can affect the overall security provided. A method is presented for fairly measuring the effectiveness of an RMS in performing security allocation and assignments with respect to security choices made by metacomputer users and applications.
NPS Report Number
NPS-CS-00-004Related items
Showing items related by title, author, creator and subject.
-
IPsec Modulation for Quality of Security Service
Sypropoulou, Evdoxia; Agar, Chris; Levin, Timothy E.; Irvine, Cynthia E. (15th International Parallel and Distributed Processing Symposium (IPDPS 2001), 10th Heterogeneous Computing Workshop (HCW 2001), (San Francisco, CA), pp. 810?823, IEEE Computer Society, April 2001.(, 2002-03-13);This paper discusses the modulation of security services in response to changes in network conditions or as a result of modified user or application security requirements. First, the notion of security variability and how ... -
Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE
Irvine, Cynthia E.; Thompson, Michael F. (2010);CyberCIEGE is a sophisticated network security simulation packaged as a video game and used by educators around the world to enhance information assurance education and training at universities, community colleges, within ... -
An introduction to Quality of Security Services
Irvine, Cynthia E.; Levin, Timothy E. (Monterey, California. Naval Postgraduate School, 1999); NPS-CS-00-005We examine the concept of security as a dimension of Quality of Service in distributed systems. We provide a discussion and examples of user- specified security variables and show how the range of service levels associated ...