International Symposium on Collaborative Technologies and Systems (CTS'06)
DOI: 10.1109/cts.2006.59
|View full text |Cite
|
Sign up to set email alerts
|

Policy Based Access Control in Dynamic Grid-based Collaborative Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 2 publications
0
16
0
Order By: Relevance
“…Toninelli et al [15] present an approach towards combining rule-based and ontology-based policies in pervasive environments. Demchenko et al [16] propose an access control model and mechanism for grid-based collaborative applications. Massa et al [17] use the dataset from Epinions.com to do computational experiments on employing global versus local trust metrics.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Toninelli et al [15] present an approach towards combining rule-based and ontology-based policies in pervasive environments. Demchenko et al [16] propose an access control model and mechanism for grid-based collaborative applications. Massa et al [17] use the dataset from Epinions.com to do computational experiments on employing global versus local trust metrics.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The University of Amsterdam's Advanced Internet Research group has published a number of papers describing both the networking and the AAA issues for such a system, including [13] [14] [9] . They are using the IETF AAA Framework [27], and use the OASIS eXtensible Access Control Markup Language (XACML) Version 2 to describe policy.…”
Section: A Related Workmentioning
confidence: 99%
“…After the positive AuthZ/PDP decision, the AuthZ session can be created and AuthZ ticket generated containing reservation ID and full AuthZ session context. In consequent service/resource requests, if the AuthZ ticket is presented, the request can be evaluated by the PEP (locally, without consulting slower request evaluation with the PDP) and access granted based on matching between the AuthZ ticket and presented Requestor's credentials [2,7].…”
Section: Security Infrastructure Requirements In Vl/crp-ucmentioning
confidence: 99%
“…Currently typical Grid-based Collaborative Environment (GCE) is created as project or experiment oriented and relies on previously established and offline maintained trust relations between participating members [2]. To become truly open collaborative environment and ensure the same level of security and privacy (to user data protection) as personal or organisation owned systems, the virtual workspace provisioning should rely on the multiplayer security model of the generalised user controlled Complex Resource Provisioning (CRP-UC) [3].…”
Section: Introductionmentioning
confidence: 99%