Loading…
Security principles for public-resource modeling research
Large-scale distributed computing projects have many security concerns due to their public and often "open" nature. Climateprediction.net (CPDN) is taking the concept of public-resource, high-throughput grid computing a stage further, by using it for a major piece of modeling research. The...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 324 |
container_issue | |
container_start_page | 319 |
container_title | |
container_volume | |
creator | Stainforth, D. Martin, A. Simpson, A. Christensen, C. Kettleborough, J. Aina, T. Allen, M. |
description | Large-scale distributed computing projects have many security concerns due to their public and often "open" nature. Climateprediction.net (CPDN) is taking the concept of public-resource, high-throughput grid computing a stage further, by using it for a major piece of modeling research. The aim is to harness the spare CPU cycles of potentially millions of individual users' PCs to run a massive ensemble of climate simulations. In doing so it has been faced with a range of security and integrity issues beyond those encountered by previous projects but likely also to confront similar initiatives in the future. This paper introduces the project and its software architecture, and outlines a threat model for such situations, including threats to participants, threats to the experiment and threats to other stakeholders. It goes on to discuss how these threats have been addressed, with the procedures presented expected to form a valuable foundation for an increasing number of similar projects. |
doi_str_mv | 10.1109/ENABL.2004.54 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_CHZPO</sourceid><recordid>TN_cdi_pascalfrancis_primary_17564634</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1376853</ieee_id><sourcerecordid>17564634</sourcerecordid><originalsourceid>FETCH-LOGICAL-i205t-e31eb55935defd181056a63f5a5bdee0cb66e5520c2113c5ff499e42922744a33</originalsourceid><addsrcrecordid>eNpFj71PwzAUxC0-JNLCyMSShTHBz_Zz4rFU5UOKYADmynGewShtIrsd-t83UpGYTrr76XTH2C3wEoCbh9Xb4rEpBeeqRHXGMqEVFDVoc85mvNIGBdQSL1gGKFShUFVXbJbSL-dSK11lzHyQ28ewO-RjDFsXxp5S7oeYj_u2D66IlIZ9dJRvho76sP3OJ4dsdD_X7NLbPtHNn87Z19Pqc_lSNO_Pr8tFUwTBcVeQBGoRjcSOfAc1cNRWS48W246Iu1ZrQhTcCQDp0HtlDClhhKiUslLO2f2pd7TJ2d5HO81M62nuxsbDGiqcnkg1cXcnLhDRfywrXaOUR9fDVIQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security principles for public-resource modeling research</title><source>IEEE Xplore All Conference Series</source><creator>Stainforth, D. ; Martin, A. ; Simpson, A. ; Christensen, C. ; Kettleborough, J. ; Aina, T. ; Allen, M.</creator><creatorcontrib>Stainforth, D. ; Martin, A. ; Simpson, A. ; Christensen, C. ; Kettleborough, J. ; Aina, T. ; Allen, M.</creatorcontrib><description>Large-scale distributed computing projects have many security concerns due to their public and often "open" nature. Climateprediction.net (CPDN) is taking the concept of public-resource, high-throughput grid computing a stage further, by using it for a major piece of modeling research. The aim is to harness the spare CPU cycles of potentially millions of individual users' PCs to run a massive ensemble of climate simulations. In doing so it has been faced with a range of security and integrity issues beyond those encountered by previous projects but likely also to confront similar initiatives in the future. This paper introduces the project and its software architecture, and outlines a threat model for such situations, including threats to participants, threats to the experiment and threats to other stakeholders. It goes on to discuss how these threats have been addressed, with the procedures presented expected to form a valuable foundation for an increasing number of similar projects.</description><identifier>ISSN: 1524-4547</identifier><identifier>ISBN: 0769521835</identifier><identifier>ISBN: 9780769521831</identifier><identifier>EISSN: 2641-8169</identifier><identifier>DOI: 10.1109/ENABL.2004.54</identifier><language>eng</language><publisher>Los Alamitos CA: IEEE</publisher><subject>Applied sciences ; Computational modeling ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Distributed computing ; Exact sciences and technology ; Grid computing ; Large-scale systems ; Personal communication networks ; Security ; Software ; Software architecture</subject><ispartof>13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2004, p.319-324</ispartof><rights>2006 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1376853$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1376853$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17564634$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Stainforth, D.</creatorcontrib><creatorcontrib>Martin, A.</creatorcontrib><creatorcontrib>Simpson, A.</creatorcontrib><creatorcontrib>Christensen, C.</creatorcontrib><creatorcontrib>Kettleborough, J.</creatorcontrib><creatorcontrib>Aina, T.</creatorcontrib><creatorcontrib>Allen, M.</creatorcontrib><title>Security principles for public-resource modeling research</title><title>13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</title><addtitle>ENABL</addtitle><description>Large-scale distributed computing projects have many security concerns due to their public and often "open" nature. Climateprediction.net (CPDN) is taking the concept of public-resource, high-throughput grid computing a stage further, by using it for a major piece of modeling research. The aim is to harness the spare CPU cycles of potentially millions of individual users' PCs to run a massive ensemble of climate simulations. In doing so it has been faced with a range of security and integrity issues beyond those encountered by previous projects but likely also to confront similar initiatives in the future. This paper introduces the project and its software architecture, and outlines a threat model for such situations, including threats to participants, threats to the experiment and threats to other stakeholders. It goes on to discuss how these threats have been addressed, with the procedures presented expected to form a valuable foundation for an increasing number of similar projects.</description><subject>Applied sciences</subject><subject>Computational modeling</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Distributed computing</subject><subject>Exact sciences and technology</subject><subject>Grid computing</subject><subject>Large-scale systems</subject><subject>Personal communication networks</subject><subject>Security</subject><subject>Software</subject><subject>Software architecture</subject><issn>1524-4547</issn><issn>2641-8169</issn><isbn>0769521835</isbn><isbn>9780769521831</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFj71PwzAUxC0-JNLCyMSShTHBz_Zz4rFU5UOKYADmynGewShtIrsd-t83UpGYTrr76XTH2C3wEoCbh9Xb4rEpBeeqRHXGMqEVFDVoc85mvNIGBdQSL1gGKFShUFVXbJbSL-dSK11lzHyQ28ewO-RjDFsXxp5S7oeYj_u2D66IlIZ9dJRvho76sP3OJ4dsdD_X7NLbPtHNn87Z19Pqc_lSNO_Pr8tFUwTBcVeQBGoRjcSOfAc1cNRWS48W246Iu1ZrQhTcCQDp0HtlDClhhKiUslLO2f2pd7TJ2d5HO81M62nuxsbDGiqcnkg1cXcnLhDRfywrXaOUR9fDVIQ</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Stainforth, D.</creator><creator>Martin, A.</creator><creator>Simpson, A.</creator><creator>Christensen, C.</creator><creator>Kettleborough, J.</creator><creator>Aina, T.</creator><creator>Allen, M.</creator><general>IEEE</general><general>IEEE Computer Society Press</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Security principles for public-resource modeling research</title><author>Stainforth, D. ; Martin, A. ; Simpson, A. ; Christensen, C. ; Kettleborough, J. ; Aina, T. ; Allen, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i205t-e31eb55935defd181056a63f5a5bdee0cb66e5520c2113c5ff499e42922744a33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Computational modeling</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Distributed computing</topic><topic>Exact sciences and technology</topic><topic>Grid computing</topic><topic>Large-scale systems</topic><topic>Personal communication networks</topic><topic>Security</topic><topic>Software</topic><topic>Software architecture</topic><toplevel>online_resources</toplevel><creatorcontrib>Stainforth, D.</creatorcontrib><creatorcontrib>Martin, A.</creatorcontrib><creatorcontrib>Simpson, A.</creatorcontrib><creatorcontrib>Christensen, C.</creatorcontrib><creatorcontrib>Kettleborough, J.</creatorcontrib><creatorcontrib>Aina, T.</creatorcontrib><creatorcontrib>Allen, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Stainforth, D.</au><au>Martin, A.</au><au>Simpson, A.</au><au>Christensen, C.</au><au>Kettleborough, J.</au><au>Aina, T.</au><au>Allen, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security principles for public-resource modeling research</atitle><btitle>13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</btitle><stitle>ENABL</stitle><date>2004</date><risdate>2004</risdate><spage>319</spage><epage>324</epage><pages>319-324</pages><issn>1524-4547</issn><eissn>2641-8169</eissn><isbn>0769521835</isbn><isbn>9780769521831</isbn><abstract>Large-scale distributed computing projects have many security concerns due to their public and often "open" nature. Climateprediction.net (CPDN) is taking the concept of public-resource, high-throughput grid computing a stage further, by using it for a major piece of modeling research. The aim is to harness the spare CPU cycles of potentially millions of individual users' PCs to run a massive ensemble of climate simulations. In doing so it has been faced with a range of security and integrity issues beyond those encountered by previous projects but likely also to confront similar initiatives in the future. This paper introduces the project and its software architecture, and outlines a threat model for such situations, including threats to participants, threats to the experiment and threats to other stakeholders. It goes on to discuss how these threats have been addressed, with the procedures presented expected to form a valuable foundation for an increasing number of similar projects.</abstract><cop>Los Alamitos CA</cop><pub>IEEE</pub><doi>10.1109/ENABL.2004.54</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1524-4547 |
ispartof | 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2004, p.319-324 |
issn | 1524-4547 2641-8169 |
language | eng |
recordid | cdi_pascalfrancis_primary_17564634 |
source | IEEE Xplore All Conference Series |
subjects | Applied sciences Computational modeling Computer science control theory systems Computer systems and distributed systems. User interface Distributed computing Exact sciences and technology Grid computing Large-scale systems Personal communication networks Security Software Software architecture |
title | Security principles for public-resource modeling research |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T02%3A28%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20principles%20for%20public-resource%20modeling%20research&rft.btitle=13th%20IEEE%20International%20Workshops%20on%20Enabling%20Technologies:%20Infrastructure%20for%20Collaborative%20Enterprises&rft.au=Stainforth,%20D.&rft.date=2004&rft.spage=319&rft.epage=324&rft.pages=319-324&rft.issn=1524-4547&rft.eissn=2641-8169&rft.isbn=0769521835&rft.isbn_list=9780769521831&rft_id=info:doi/10.1109/ENABL.2004.54&rft_dat=%3Cpascalfrancis_CHZPO%3E17564634%3C/pascalfrancis_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i205t-e31eb55935defd181056a63f5a5bdee0cb66e5520c2113c5ff499e42922744a33%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1376853&rfr_iscdi=true |