Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Authorisation in Grid computing

Published: 01 January 2005 Publication History

Abstract

This paper briefly surveys how authorisation in Grid computing has evolved during the last few years, and presents the latest developments in which Grid applications can utilise a policy controlled authorisation infrastructure to make decisions about which users are allowed to perform which actions on which Grid resources. The paper describes the Global Grid Forum SAML interface for connecting policy based authorisation infrastructures to Grid applications, and then describes the PERMIS authorisation infrastructure which has implemented this interface. The paper concludes with suggestions about how this work will evolve in the future.

References

[1]
http://grid-auth.infn.it/docs/VOMS-Santiago.pdf
[2]
Blaze M, Feigenbaum J, Ioannidis J. The KeyNote Trust-Management System Version 2, RFC 2704; September 1999.
[3]
Role-based access control with X.509 attribute certificates. IEEE Internet Computing. 62-69.
[4]
ISO 9594-8/ITU Rec. X.509. The Directory: Public-key and attribute certificate frameworks; 2001.
[5]
ITU-T Rec X.812|ISO/IEC 10181-3:1996. Security frameworks for open systems: access control framework; 1995.
[6]
Johnston W, Mudumbai S, Thompson M. Authorization and attribute certificates for widely distributed access control. In: IEEE 7th international workshops on enabling technologies: infrastructure for collaborative enterprises (WET ICE), Stanford, CA; June, 1998. p. 340-5 (see also http://www-itg.lbl.gov/security/Akenti/).
[7]
http://www.oasis-open.org/committees/security/
[8]
http://www.oasis-open.org/committees/xacml/
[9]
Pearlman L, Welch V, Foster I, Kesselman C, Tuecke S. A community authorization service for group collaboration. In: Proceedings of the IEEE 3rd international workshop on policies for distributed systems and networks; 2002.
[10]
<http://www.casa-sotomayor.net/gt3-tutorial/multiplehtml/ch15.html>
[11]
http://www.dutchgrid.nl/DataGrid/wp4/lcas/edg-lcas-1.1
[12]
Authorization (AZN) API. January 2000. ISBN:1-85912-266-3.
[13]
https://forge.gridforum.org/projects/ogsa-authz

Cited By

View all
  • (2012)A standards-based interoperable single sign-on framework in ARC Grid middlewareJournal of Network and Computer Applications10.1016/j.jnca.2011.03.00635:3(892-904)Online publication date: 1-May-2012
  • (2012)domRBACComputers and Security10.1016/j.cose.2012.01.01031:4(540-556)Online publication date: 1-Jun-2012
  • (2011)Role-based secure inter-operation and resource usage management in mobile grid systemsProceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication10.5555/2017824.2017829(38-53)Online publication date: 1-Jun-2011
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Information Security Tech. Report
Information Security Tech. Report  Volume 10, Issue 1
January, 2005
58 pages

Publisher

Elsevier Advanced Technology Publications

United Kingdom

Publication History

Published: 01 January 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2012)A standards-based interoperable single sign-on framework in ARC Grid middlewareJournal of Network and Computer Applications10.1016/j.jnca.2011.03.00635:3(892-904)Online publication date: 1-May-2012
  • (2012)domRBACComputers and Security10.1016/j.cose.2012.01.01031:4(540-556)Online publication date: 1-Jun-2012
  • (2011)Role-based secure inter-operation and resource usage management in mobile grid systemsProceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication10.5555/2017824.2017829(38-53)Online publication date: 1-Jun-2011
  • (2010)SecPAL: Design and semantics of a decentralized authorization languageJournal of Computer Security10.5555/1835408.183541118:4(619-665)Online publication date: 1-Dec-2010
  • (2010)Single Attestation Image for a Trusted and Scalable GridInternational Journal of Grid and High Performance Computing10.4018/jghpc.20100928022:1(21-33)Online publication date: 1-Jan-2010
  • (2010)Privacy protection of grid service requesters through distributed attribute based access control modelProceedings of the 5th international conference on Advances in Grid and Pervasive Computing10.1007/978-3-642-13067-0_59(573-582)Online publication date: 10-May-2010
  • (2007)A PMI-aware extension for the SSH serviceProceedings of the 7th international conference on Parallel processing and applied mathematics10.5555/1786194.1786304(932-941)Online publication date: 9-Sep-2007
  • (2007)Towards semantic-aware management of security services in GT4Multiagent and Grid Systems10.5555/1376588.13765913:4(369-379)Online publication date: 1-Dec-2007
  • (2007)On trust management in gridsProceedings of the 1st international conference on Autonomic computing and communication systems10.5555/1365562.1365568(1-7)Online publication date: 28-Oct-2007
  • (2006)Review of security models applied to distributed data accessProceedings of the CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics conference on Parallel processing10.5555/1765606.1765612(34-48)Online publication date: 29-Aug-2006

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media