ENGINEERING PROCESS BASED ON GRID USE CASES FOR MOBILE GRID SYSTEMS
David G. Rosado, Eduardo Fernández-Medina, Mario Piattini, Javier López
2008
Abstract
The interest to incorporate mobile devices into Grid systems has arisen with two main purposes. The first one is to enrich users of these devices while the other is that of enriching the own Grid infrastructure. Security of these systems, due to their distributed and open nature, is considered a topic of great interest. A formal approach to security in the software life cycle is essential to protect corporate resources. However, little attention has been paid to this aspect of software development. Due to its criticality, security should be integrated as a formal approach into the software life cycle. We are developing a methodology of development for secure mobile Grid computing based systems that helps to design and build secure Grid systems with support for mobile devices directed by use cases and security use cases and focused on service-oriented security architecture. In this paper, we will present one of the first steps of our methodology consisting of analyzing security requirements of mobile grid systems. This analysis will allow us to obtain a set of security requirements that our methodology must cover and implement.
References
- Anderson, R. (2001). Security Engineering - A Guide to Building Dependable Distributed Systems, John Wiley&Sons.
- Baskerville, R. (1993). "Information systems security design methods: implications for information systems development." ACM Computing Surveys 25(4): 375 - 414.
- Bradford, P. G., B. M. Grizzell, et al. (2007). Cap. 4. Pragmatic Security for Constrained Wireless Networks. Security in Distributed, Grid, Mobile, and Pervasive Computing. A. Publications. The University of Alabama, Tuscaloosa, USA: 440.
- Bruneo, D., M. Scarpa, et al. (2003). Communication paradigms for mobile grid users. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'03).
- Foster, I. and C. Kesselman (1999). The Grid: Blueprint for a Future Computing Infrastructure. San Francisco, CA, Morgan Kaufmann Publishers; 1ST edition.
- Guan, T., E. Zaluska, et al. (2005). A Grid Service Infrastructure for Mobile Devices. First International Conference on Semantics, Knowledge, an Grid (SKG 2005), Beijing, China.
- Humphrey, M., M. R. Thompson, et al. (2005). "Security for Grids." Lawrence Berkeley National Laboratory. Paper LBNL-54853.
- ITU (2004). ITU_T Recommendation X.1121. Framework of security technologies for mobile end-to-end data communications.
- Jameel, H., U. Kalim, et al. (2005). Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments. European Grid Conference EGC 2005, Amsterdam, The Netherlands, Springer.
- Litke, A., D. Skoutas, et al. (2004). Mobile Grid Computing: Changes and Challenges of Resourse Management in a Mobile Grid Environment. 5th International Conference on Practical Aspects of Knowledge Management (PAKM 2004).
- MAP (2006). Methodology for Information Systems Risk Analysis and Management (MAGERIT version 2), Ministry for Public Administration of Spain.
- Rosado, D. G., E. Fernández-Medina, et al. (2008). PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices. International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Spain, IEEE.
- Trung, T. M., Y.-H. Moon, et al. (2005). A Gateway Replication Scheme for Improving the Reliability of Mobile-to-Grid Services. IEEE International Conference on e-Business Engineering (ICEBE'05).
- Trusted Computing Group Administration (2006). Securing Mobile Devices on Converged Networks.
- Vivas, J. L., J. López, et al. (2007). Cap. 12. Grid Security Architecture: Requirements,fundamentals, standards, and models. Security in Distributed, Grid, Mobile, and Pervasive Computing. A. Publications. Tuscaloosa, USA: 440.
Paper Citation
in Harvard Style
G. Rosado D., Fernández-Medina E., Piattini M. and López J. (2008). ENGINEERING PROCESS BASED ON GRID USE CASES FOR MOBILE GRID SYSTEMS . In Proceedings of the Third International Conference on Software and Data Technologies - Volume 2: ICSOFT, ISBN 978-989-8111-52-4, pages 146-151. DOI: 10.5220/0001879901460151
in Bibtex Style
@conference{icsoft08,
author={David G. Rosado and Eduardo Fernández-Medina and Mario Piattini and Javier López},
title={ENGINEERING PROCESS BASED ON GRID USE CASES FOR MOBILE GRID SYSTEMS},
booktitle={Proceedings of the Third International Conference on Software and Data Technologies - Volume 2: ICSOFT,},
year={2008},
pages={146-151},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001879901460151},
isbn={978-989-8111-52-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Third International Conference on Software and Data Technologies - Volume 2: ICSOFT,
TI - ENGINEERING PROCESS BASED ON GRID USE CASES FOR MOBILE GRID SYSTEMS
SN - 978-989-8111-52-4
AU - G. Rosado D.
AU - Fernández-Medina E.
AU - Piattini M.
AU - López J.
PY - 2008
SP - 146
EP - 151
DO - 10.5220/0001879901460151