2008
DOI: 10.1007/s11276-008-0135-0
|View full text |Cite
|
Sign up to set email alerts
|

A context-constrained authorisation (CoCoA) framework for pervasive grid computing

Abstract: The paper discusses access control implications when bridging Pervasive and Grid computing, and analyses the limitations of current Grid authorisation solutions when applied to Pervasive Grid environments. The key authorisation requirements for Pervasive Grid computing are identified and a novel Grid authorisation framework, the context-constrained authorisation framework CoCoA, is proposed. The CoCoA framework takes into account not only users' static attributes, but also their dynamic contextual attributes t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…The papers analyzed mostly use the term distributed to describe distribution of computational workload among different entities in the ubicomp environment. The second most common use of the term is associated with a description of the ubicomp environment, where the authors commonly use the terms heterogeneous (Chin et al, 2010;López et al, 2007), open and dynamic (see Chin et al, 2010;Li et al, 2008;Park et al, 2010) and decentralized with flexible network topologies (Boukerche and Ren, 2008;Gedik, 2008;Manweiler et al, 2009;Meyerowitz and Roy Choudhury, 2009) in conjunction with the term distributed.…”
Section: Rq23 -Security Goalsmentioning
confidence: 99%
“…The papers analyzed mostly use the term distributed to describe distribution of computational workload among different entities in the ubicomp environment. The second most common use of the term is associated with a description of the ubicomp environment, where the authors commonly use the terms heterogeneous (Chin et al, 2010;López et al, 2007), open and dynamic (see Chin et al, 2010;Li et al, 2008;Park et al, 2010) and decentralized with flexible network topologies (Boukerche and Ren, 2008;Gedik, 2008;Manweiler et al, 2009;Meyerowitz and Roy Choudhury, 2009) in conjunction with the term distributed.…”
Section: Rq23 -Security Goalsmentioning
confidence: 99%