2006 Second IEEE International Conference on E-Science and Grid Computing (E-Science'06) 2006
DOI: 10.1109/e-science.2006.261106
|View full text |Cite
|
Sign up to set email alerts
|

Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2007
2007
2009
2009

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…Authorization to access a specific resource is performed by using a locally managed Access Control List (ACL) of authorized users or gridmapfile. As the grid-mapfile only allows the mapping users' DNs to local user names at resource level, it lacks the ability to grant fine grained access control to the resources, thus compromising the security of the providers (Sinnott et al 2006a). Moreover, any access control relying only on the local listing names of authorized users is not scalable to the proportions needed for a VO that may grow dynamically (Sinnott et al 2006a, b).…”
Section: Authentication and Authorizationmentioning
confidence: 99%
See 2 more Smart Citations
“…Authorization to access a specific resource is performed by using a locally managed Access Control List (ACL) of authorized users or gridmapfile. As the grid-mapfile only allows the mapping users' DNs to local user names at resource level, it lacks the ability to grant fine grained access control to the resources, thus compromising the security of the providers (Sinnott et al 2006a). Moreover, any access control relying only on the local listing names of authorized users is not scalable to the proportions needed for a VO that may grow dynamically (Sinnott et al 2006a, b).…”
Section: Authentication and Authorizationmentioning
confidence: 99%
“…Advance authorization services aiming at fine grained access control are based on users sharing similar roles (Demchenko et al 2006), for instance membership of the same project, all researchers at ECMWF, etc. As Sinnott et al 2006a state attribute basedauthorization is scalable to global proportions and when it is coupled to a policy based authorization system, allows fine-grained access control to local resources. One of the challenges of the SIMDAT architecture is, therefore, to embrace multi-organization federations, allowing scalable growth of the distributed infrastructure.…”
Section: Fine-grained Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…To our knowledge, DyVOSE (Sinnott, Chadwick, Koetsier, Otenko, Watt, & Nguyen, 2006) may be the only scheme that has similar functionalities with our novel framework. It is a delegation authorization model based on X.509 Attribute Certificates.…”
Section: Data Science Journal Volume 7 25 December 2008mentioning
confidence: 99%
“…This account registration, which is a simple authorization method, is commonly achieved with middleware such as Globus, through gridmap files which map the distinguished name (DN) of a certificate to a local user account. As discussed in [14][15][16], there are many limitations associated with this model of authorisation and access control. Furthermore, such a close association between identity management and authorisation can be a problem when the status of the user changes.…”
Section: X509-based Pkismentioning
confidence: 99%