BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Daonity - Grid security with behaviour conformity from Trusted Com
 puting - Wenbo Mao\, HP Labs\, China
DTSTART:20060919T151500Z
DTEND:20060919T161500Z
UID:TALK5478@talks.cam.ac.uk
CONTACT:Saar Drimer
DESCRIPTION:A central security requirement for grid computing can be refer
 red to as behaviour conformity. This is an assurance that ad hoc related p
 rincipals (users\, platforms or instruments) forming a grid virtual organi
 sation (VO) must each act in conformity with the rules for the VO constitu
 tion. Existing grid security practice has little means to enforce behaviou
 r conformity and consequently falls short of satisfactory solutions to a n
 umber of problems.\n\nTrusted Computing (TC) technology can add to grid co
 mputing the needed property of behaviour conformity. With TC using an esse
 ntially in-platform (trusted) third party\, a principal can be imposed to 
 have conformed behaviour and this fact can be reported to interested parti
 es who may only need to be ad hoc related to the former. In this talk we r
 eport Daonity\, a TC enabled emerging work in grid security standard\, to 
 manifest how behaviour conformity can help to improve grid security. 
LOCATION:Lecture Theatre 2\, Computer Laboratory\, William Gates Building
END:VEVENT
END:VCALENDAR
