Method and system for securing a commercial grid network
First Claim
1. A method for securing a commercial grid network, comprising:
- receiving a lease request from a client to lease a computing resource selected from a plurality of computing resources in the commercial grid network;
mapping a unique identifier of the client to a security label selected from a plurality of unmapped security labels to obtain a client-label mapping based on the lease request;
mapping a unique identifier of the computing resource to the security label to obtain a resource-label mapping based on the lease request;
storing the client-label mapping and the resource-label mapping in a security label repository to obtain stored security label mappings; and
authenticating, by the commercial grid network, an access request from the client to the computing resource using the stored security label mappings.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securing a commercial grid network involves receiving a lease request from a client to lease a computing resource selected from multiple computing resources in the commercial grid network, mapping a unique identifier of the client to a security label selected from multiple unmapped security labels to obtain a client-label mapping based on the lease request, mapping a unique identifier of the computing resource to the security label to obtain a resource-label mapping based on the lease request, storing the client-label mapping and the resource-label mapping in a security label repository to obtain stored security label mappings, and authenticating, by the commercial grid network, an access request from the client to the computing resource using the stored security label mappings.
36 Citations
20 Claims
-
1. A method for securing a commercial grid network, comprising:
-
receiving a lease request from a client to lease a computing resource selected from a plurality of computing resources in the commercial grid network; mapping a unique identifier of the client to a security label selected from a plurality of unmapped security labels to obtain a client-label mapping based on the lease request; mapping a unique identifier of the computing resource to the security label to obtain a resource-label mapping based on the lease request; storing the client-label mapping and the resource-label mapping in a security label repository to obtain stored security label mappings; and authenticating, by the commercial grid network, an access request from the client to the computing resource using the stored security label mappings. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A commercial grid network comprising:
-
a plurality of computing resources; a security label repository configured to store a plurality of unmapped security labels; an administrative node configured to; receive a lease request from a client to lease a computing resource selected from the plurality of computing resources, map a unique identifier of the client to a security label selected from the plurality of unmapped security labels to obtain a client-label mapping based on the lease request, map a unique identifier of the computing resource to the security label to obtain a resource-label mapping based on the lease request, and store the client-label mapping and the resource-label mapping in the security label repository to obtain stored security label mappings; and a forwarding node configured to authenticate an access request from the client to the computing resource using the stored security label mappings. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer readable medium comprising executable instructions for:
-
receiving a lease request from a client to lease a computing resource selected from a plurality of computing resources in the commercial grid network; mapping a unique identifier of the client to a security label selected from a plurality of unmapped security labels to obtain a client-label mapping based on the lease request; mapping a unique identifier of the computing resource to the security label to obtain a resource-label mapping based on the lease request; storing the client-label mapping and the resource-label mapping in a security label repository to obtain stored security label mappings; and authenticating, by the commercial grid network, an access request from the client to the computing resource using the stored security label mappings. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification