2013 IEEE 5th International Conference on Cloud Computing Technology and Science 2013
DOI: 10.1109/cloudcom.2013.13
|View full text |Cite
|
Sign up to set email alerts
|

Identity Federation with VOMS in Cloud Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
3

Year Published

2015
2015
2019
2019

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 9 publications
0
4
0
3
Order By: Relevance
“…The provision of an effective distributed authentication and authorization in heterogeneous platforms is fundamental to support access to distributed infrastructures. Several efforts have been made in this context [1][2][3][4][5] but they were focused on specific infrastructures and services. However, although some of these approaches have been used in production in specific e-Infrastructures [6] they are difficult to implement in a broader environment.…”
Section: Context and State Of The Artmentioning
confidence: 99%
See 1 more Smart Citation
“…The provision of an effective distributed authentication and authorization in heterogeneous platforms is fundamental to support access to distributed infrastructures. Several efforts have been made in this context [1][2][3][4][5] but they were focused on specific infrastructures and services. However, although some of these approaches have been used in production in specific e-Infrastructures [6] they are difficult to implement in a broader environment.…”
Section: Context and State Of The Artmentioning
confidence: 99%
“…1 The udocker novelty consists in enabling to pull and execute Docker containers [11] without using or requiring the installation of the Docker software. By using udocker it is possible to encapsulate applications in Docker containers and execute them in batch or interactive systems where Docker is unavailable.…”
Section: Supporting Linux Containersmentioning
confidence: 99%
“…Pode-se perceber que alguns trabalhos apresentam a questão da integração da CN com OV [19,20,21,22], já outros tratam dos problemas de autenticação e segurança existentes nestes ambientes [23] e, por fim, alguns trabalhos apresentam abordagens que fornecem suporte para a criação ou gerenciamento de OVs em plataformas de nuvem computacional (ex. : OpenStack) [24,25,26].…”
Section: Computação Em Nuvemunclassified
“…Lee e Desai [24] descrevem um modelo de implementação de OV baseadas na plataforma OpenStack, apresentando um modelo de OV com os seus componentes na nuvem e os problemas que a abordagem busca solucionar, como a autenticação e segurança em ambientes externos, utilizando o serviço de segurança do OpenStack (KeyStone). García et al [25] apresentam um serviço de filiação de membros da OV para prover federação de identidades em ambientes que apresentam múltiplos provedores. Lee [26] apresenta uma extensão do trabalho realizado em Lee e Desai [24] e uma revisão sistemática para as OVs baseadas no modelo de federação.…”
Section: Organizações Virtuais E Computação Em Nuvemunclassified
“…Authorization is done by embedding Attribute Certificates (AC) into the proxy, containing assertions about the user. The most notable service is the Virtual Organization Management System (VOMS) [46], being used in some federated cloud infrastructures [47]. However, X.509 certificates are not considered being user-friendly in spite of being settled on several distributed infrastructures over the years.…”
Section: Authentication and Authorizationmentioning
confidence: 99%