TY - GEN
T1 - Managing contracts in pleiades using trust management
AU - Norvik, Christoffer
AU - Morrison, John P.
AU - Marinescu, Dan C.
AU - Yu, Chen
AU - Marinescu, Gabriela M.
AU - Siegel, Howard Jay
PY - 2008
Y1 - 2008
N2 - The advent of multicore technologies is set to significantly increase the average compute power per machine. Effective and efficient exploitation of this power poses unprecedented challenges and opportunities. The Pleiades system, currently under development in UCF, CSU and UCC [1], proposes the construction of a distributed, heterogeneous, and secure marketplace for trading and administer these resources whose owners sign up to various quality of service (QoS) contracts, in return for financial and in-kind payment. This paper presents a very important part of the Pleiades system: addressing the role of Trust Management (TM) in the generation and enforcement of these contracts. The approach taken significantly reduces the overhead that is traditionally assumed with cryptographic solutions, by the dynamic and a priory creation of a secure environment in which these expensive checks associated with cryptographic solutions, are not required.
AB - The advent of multicore technologies is set to significantly increase the average compute power per machine. Effective and efficient exploitation of this power poses unprecedented challenges and opportunities. The Pleiades system, currently under development in UCF, CSU and UCC [1], proposes the construction of a distributed, heterogeneous, and secure marketplace for trading and administer these resources whose owners sign up to various quality of service (QoS) contracts, in return for financial and in-kind payment. This paper presents a very important part of the Pleiades system: addressing the role of Trust Management (TM) in the generation and enforcement of these contracts. The approach taken significantly reduces the overhead that is traditionally assumed with cryptographic solutions, by the dynamic and a priory creation of a secure environment in which these expensive checks associated with cryptographic solutions, are not required.
UR - https://www.scopus.com/pages/publications/48249089249
U2 - 10.1007/978-3-540-69295-9_37
DO - 10.1007/978-3-540-69295-9_37
M3 - Conference proceeding
AN - SCOPUS:48249089249
SN - 3540692940
SN - 9783540692942
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 470
EP - 480
BT - Autonomic and Trusted Computing - 5th International Conference, ATC 2008, Proceedings
T2 - 5th International Conference on Autonomic and Trusted Computing, ATC 2008
Y2 - 23 June 2008 through 25 June 2008
ER -