2004
DOI: 10.1007/978-3-540-30470-8_30
|View full text |Cite
|
Sign up to set email alerts
|

Improving Grid Services Security with Fine Grain Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 10 publications
0
13
0
Order By: Relevance
“…This extension requires analysing bytecode instead of source code when extracting usage policies and when constructing the CFG. Martinelli et al [2,29,30] model security policies as process algebras. They implement a custom JVM, with an execution monitor that traps system calls and fires them concurrently to the policy.…”
Section: Static Analysis and Optimizationsmentioning
confidence: 99%
“…This extension requires analysing bytecode instead of source code when extracting usage policies and when constructing the CFG. Martinelli et al [2,29,30] model security policies as process algebras. They implement a custom JVM, with an execution monitor that traps system calls and fires them concurrently to the policy.…”
Section: Static Analysis and Optimizationsmentioning
confidence: 99%
“…We then decided to adopt an operational policy language (e.g., see [1]) that we feel is close to user's expertise than others more denotational. Since, we deal with sequence of actions, potentially involving different entities, we decided to use a process description language.…”
Section: Policy Specificationmentioning
confidence: 99%
“…In [1], [15] we advocated the adoption of the usage control model (UCON), proposed by Sandhu and Park (e.g., see [18]), to the GRID environment. This paper describes a possible architecture and policy language and shows how this is complete to implement the usage control model.…”
Section: Introductionmentioning
confidence: 99%
“…The approach is based on a fine-grained and historybased model introduced in [2]. The monitoring is finegrained because instead of considering the execution of an application as a single atomic action we split down the monitoring on the basic operations performed by an application during its execution.…”
Section: Security In Grid Computingmentioning
confidence: 99%