2011
DOI: 10.1098/rsfs.2010.0026
|View full text |Cite
|
Sign up to set email alerts
|

Audited credential delegation: a usable security solution for the virtual physiological human toolkit

Abstract: We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…The fact that ACD is based on a formal model means that it is well documented and can be certified in the future. Finally, the design of ACD is flexible enough to accommodate changes in the security policy, such as adding new roles and providing fine grained authorization [41].…”
Section: Audited Credential Delegationmentioning
confidence: 99%
See 1 more Smart Citation
“…The fact that ACD is based on a formal model means that it is well documented and can be certified in the future. Finally, the design of ACD is flexible enough to accommodate changes in the security policy, such as adding new roles and providing fine grained authorization [41].…”
Section: Audited Credential Delegationmentioning
confidence: 99%
“…Audited Credential Delegation [40,41] (ACD) is a security wrapper that can be integrated with the functionality of a software system to provide authentication, authorization and auditing security goals. ACD can also be used to set up several virtual organizations (VO) that have specific goals.…”
Section: Audited Credential Delegationmentioning
confidence: 99%
“…In some of the simulation scenarios considered by the project, the cloud platform will not be able meet the computational requirements of some workflow components, meaning that effort is underway in the VPH-Share project to develop a service that will allow seamless interoperation between the cloud infrastructure and grids of high performance computing resources. The Application Hosting Environment [14] (AHE) and Audited Credential Delegation [8] (ACD) fulfil this important task of providing grid access from the cloud platform.…”
Section: Introductionmentioning
confidence: 99%
“…GSEngine is connected to the Application Hosting Environment (AHE) [42] server in order to launch computational simulations across a range of distributed computing resources, and to the data environment in order to access the clinical and imaging data on which the simulations are based. Security of data and access to remote resources are provided via the Audited Credential Delegation [43,44] extension to the AHE.…”
Section: Integrated Contracancrum E-science Environmentmentioning
confidence: 99%