Grid Computing Security

By Anirban Chakrabarti

Grid Computing Security Cover Image

Grid computing is widely regarded as a technology of immense potential. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area.

Full Description

  • ISBN13: 978-3-5404-4492-3
  • 346 Pages
  • User Level: Professionals
  • Publication Date: May 26, 2007
  • Available eBook Formats: PDF
  • eBook Price: $89.95
Buy eBook Buy Print Book Add to Wishlist
Full Description
Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises are still hesitant about the implementation of an enterprise-level grid system, due to the lack of consistent and widely used standards. Security is probably the most important concern and needs both close understanding and careful implementation as grid computing offers unique security challenges. Based on his research and industry experience, Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, infrastructure-related, and management-related issues. He discusses all three categories in detail, presents existing solutions, standards, and products, and pinpoints their shortcomings and open questions. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area, targeting professionals in the grid industry as well as students specializing in grid computing, networking, peer-to-peer systems, or operating systems. It can also be used as the basis for a self-contained course on grid computing security, complementing the author’s tutorials at grid conferences.
Table of Contents

Table of Contents

  1. 1) Introduction
  2. 2) Overview of Security
  3. 3) Taxonomy of Grid Security Issues
  4. 4) Grid Information Security Architecture
  5. 5) Grid Authorization Systems
  6. 6) Service Level Security in Grid
  7. 7) Host Level Security
  8. 8) Grid Network Security
  9. 9) Grid Credential Management Systems
  10. 10) Managing Trust in Grid
  11. 11) Grid Monitoring
  12. 12) Putting it All Together
  13. 13) Conclusion
  14. Appendix, Bibliography, and Index.
Errata

Please Login to submit errata.

No errata are currently published