Abstract
With the rapid development of the global information infrastructure, the use of virtual organization (VO) is gaining increasing importance as a model for studying business and organizational structures. The notion of VO is significant in that it could serve as a basic framework for implementing geographically distributed, cross-organizational application systems in a highly flexible manner. To further enhance the pervasiveness of VO, it is of great importance that participation of mobile computing nodes be supported. Thus, security is a critical issue due to the open nature of the wireless channels that provide connectivity to mobile devices. This paper discusses, from an application angle, the importance of supporting mobile devices in VO. It also discusses the design of security infrastructures that support mobile nodes in mission-specific applications. A simple grid security infrastructure that supports participation of mobile computing nodes is also proposed to illustrate the implementation feasibility of the infrastructure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: enabling scalable virtual organizations. Int. J. Supercomputer Applications 15(3), 200–222 (2001)
Anckar, B., D’Incau, D.: Value creation in mobile commerce: Findings from a consumer survey. Journal of Information Technology Theory & Application 4(1) (2002)
Parson, K., Schaeffler, J.: U.S. wireless phone penetration climbs. Wireless Insider (October 2001)
Sean, G.: Networking in the palm of your hand. Network Computing 13(16) (August 2002)
Foster, I., Kesselman, C.: Globus: A Metacomputing Infrastructure Toolkit. International Journal of Supercomputer Applications 11(2) (1997)
Tapscott, D., Ticoll, D., Lowy, A.: The rise of business web. Ubiquity 1(3) (March 2000)
“Dengue fever prevention and control”, Weekly Epidemiological Record 77(6), 41–48 (August 2002)
“Overview of the Grid Security Infrastructure”, at http://www-fp.globus.org/security/overview.html
Zhou, J.Y., Lam, K.Y.: Securing digital signatures for non-repudiation. Journal of Computer Communications 22(8), 710–716 (1999)
Internet Engineering Task Force. “Transport Layer Security (TLS)”, http://www.ietf.org/html.charters/tls-charter.html
The Open Mobile Alliance Ltd, “Wireless Application Protocol”, http://www.wapforum.org
ISO/IEC DIS 9798-3. “Information technology, security techniques, entity authentication, Part 3: mechanisms using digital signature techniques (Second Edition)”, ISO/IEC (1998)
Lam, K.Y.: Building an Authentication Service for Distributed Systems. Journal of Computer Security 2(1), IOS (Amsterdam) (1993)
Lam, K.Y., Gollmann, D.: Freshness Assurance of Authentication Protocols. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol. 648, Springer, Heidelberg (1992)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lam, KY., Zhao, XB., Chung, SL., Gu, M., Sun, JG. (2004). Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. In: Chae, KJ., Yung, M. (eds) Information Security Applications. WISA 2003. Lecture Notes in Computer Science, vol 2908. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24591-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-24591-9_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20827-3
Online ISBN: 978-3-540-24591-9
eBook Packages: Springer Book Archive