Information Technology Reference
In-Depth Information
Chapter 12
Identifying Secure Mobile
Grid Use Cases
David G. Rosado
University of Castilla-La Mancha, Spain
Eduardo Fernández-Medina
University of Castilla-La Mancha, Spain
Javier López
University of Málaga, Spain
Mario Piattini
University of Castilla-La Mancha, Spain
ABSTRACT
Mobile Grid includes the characteristics of the Grid systems together with the peculiarities of Mobile
Computing, with the additional feature of supporting mobile users and resources in a seamless, trans-
parent, secure, and efficient way. Security of these systems, due to their distributed and open nature, is
considered a topic of great interest. We are elaborating a process of development to build secure mobile
Grid systems considering security on all life cycles. In this chapter, we present the practical results ap-
plying our development process to a real case, specifically we apply the part of security requirements
analysis to obtain and identify security requirements of a specific application following a set of tasks
defined for helping us in the definition, identification, and specification of the security requirements on our
case study. The process will help us to build a secure Grid application in a systematic and iterative way.
INTRODUCTION
distributed data and concurrent computing power
using clustered servers. The Grid enables resource
sharing and dynamic allocation of computational
resources, thus increasing access to distributed
data, promoting operational flexibility and col-
laboration, and allowing service providers to scale
efficiently to meet variable demands (Foster &
Kesselman, 2004).
Grid computing has emerged to cater the need
of computing-on-demand (Jana, Chaudhuri, &
Bhaumik, 2009) due to the advent of distributed
computing with sophisticated load balancing,
Search WWH ::




Custom Search