2006
DOI: 10.1007/s10723-006-9050-8
|View full text |Cite
|
Sign up to set email alerts
|

ROAM: An Authorization Manager for Grids

Abstract: The Resource Oriented Authorization Manager (ROAM) was created to provide a simple but flexible authorization system for the FusionGrid computational Grid. ROAM builds on and extends previous community efforts by both responding to access authorization requests and by providing a Web interface for resource management. ROAM works with the Globus Resource Allocation Manager (GRAM), and is general enough to be used by other virtual organizations that use Globus middleware or X.509/TLS authentication schemes to se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2007
2007
2014
2014

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 24 publications
0
2
0
1
Order By: Relevance
“…In past Grid projects, proprietary services have often been developed to address this issue (e.g. CAS [34], PRIMA [27], ROAM [6]) but none of them established itself as a widely accepted community standard as they were too tightly coupled with the middleware and the local resources. A standardization on SAML/XACML profiles to be used by all middlewares is available [11] but has not been widely adopted yet.…”
Section: An Overview Of Existing Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In past Grid projects, proprietary services have often been developed to address this issue (e.g. CAS [34], PRIMA [27], ROAM [6]) but none of them established itself as a widely accepted community standard as they were too tightly coupled with the middleware and the local resources. A standardization on SAML/XACML profiles to be used by all middlewares is available [11] but has not been widely adopted yet.…”
Section: An Overview Of Existing Solutionsmentioning
confidence: 99%
“…Django routes HTTP requests to Python functions ("view" functions), that are responsible for returning content to the user. Access control is most easily done through Python function decorators: if a view function is marked with the login required decorator, then Django ensures that HTTP requests to that URL come from logged-in users, and will redirect any unauthorized request to the site login page 6. Since the SlcsInit and VomsProxyInit servlets run in a Java server, completely separated by the server running Django, an issue arises as how to communicate certificate/proxy location and passphrases back and forth from the Django decorator to the Java servlets.…”
mentioning
confidence: 99%
“…• Os trabalhos [Lorch e Kafura, 2004] e [Burruss et al, 2006] adotam modelos com políticas complexas para a criação e gerenciamento de contas Unix locais, utilizadas na execução das tarefas. Por mais flexíveis que as políticas adotadas sejam, sua efetivação é realizada por mecanismos locais, nos quais os recursos disponíveis podem variar de acordo com a grade computacional utilizada.…”
Section: Trabalhos Relacionadosunclassified