Learn More
Mobile ad hoc networks have inherently different properties than traditional wired networks. These new characteristics present different security vulnerabilities and this paper provides a detailed classification of these threats. Threats exist to a mobile ad hoc network both from external nodes unauthorised to participate in the mobile ad hoc networks, and(More)
We propose a novel scheme that uses Trusted Computing technology to secure Grid workflows. This scheme allows the selection of trustworthy resource providers based on their platform states. The integrity and confidentiality of workflow jobs are provided using cryptographic keys that can only be accessed when resource provider platforms are in trustworthy(More)
One of the more mature instances of a serviceoriented architecture is the model known as Grid Computing. Computational Grids and Data Grids are becoming commonplace in certain sectors, yet the style of security they implement is suitable only for a fairly small subset of possible user communities. Using some case studies and experience, we describe the(More)
Trust flows in two directions in a Grid environment. The first is from the Grid user to the Grid resource, that is, the Grid trusts that the user will protect confidential information. The second is from the resource to the user, that is, the Grid will protect the user's Grid job and associated data. This paper comments on how Trusted Computing technology(More)
Today’s users typically have a multitude of electronic devices, such as desktop and laptop computers, Personal Digital Assistants (PDAs) and mobile/cellular phones, each with the capability to communicate with one another. At the same time, wireless communication has become more affordable and pervasive, and we have seen the introduction of smaller(More)