2008 IEEE Fourth International Conference on eScience 2008
DOI: 10.1109/escience.2008.53
|View full text |Cite
|
Sign up to set email alerts
|

Re-thinking Grid Security Architecture

Abstract: Abstract-The security models used in Grid systems today strongly bear the marks of their diverse origin. Historically retrofitted to the distributed systems they are designed to protect and control, the security model is usually limited in scope and applicability, and its implementation tailored towards a few specific deployment scenarios. A common approach towards even the "basic" elements such as authentication to resources is only now emerging, whereas for more complex issues such as community organization,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Grid security architecture is primarily based on the Virtual Organisations (VO) that are created by the cooperating organisations that share resources (which however remain in their their ownership) based on mutual agreement between VO members and common VO security policy. In Grids, VO actually acts as a federation of the users and resources that enables federated access control based on the federated security and trust model [20,21].…”
Section: A Paradigms Change and General Challangesmentioning
confidence: 99%
See 1 more Smart Citation
“…Grid security architecture is primarily based on the Virtual Organisations (VO) that are created by the cooperating organisations that share resources (which however remain in their their ownership) based on mutual agreement between VO members and common VO security policy. In Grids, VO actually acts as a federation of the users and resources that enables federated access control based on the federated security and trust model [20,21].…”
Section: A Paradigms Change and General Challangesmentioning
confidence: 99%
“…We refer in this paper to the Security Services Lifecycle Management (SSLM) model proposed by authors in earlier work [20]. The SSLM describes security services operation in generically distributed multidomain environment and extends the existing SLM frameworks (and SDF in particular) with the additional stages "Reservation Session Binding" (as part of the SDF reservation stage) and "Registration and Synchronisation" (as part of the SDF deployment stage), which specifically target such scenarios as the provisioned services/resources restoration, upgrade or migration (in the framework of the active provisioning session) and provide necessary mechanisms for remote data protection by binding them to the provisioning session context and remote run-time environment.…”
Section: Security Services Lifecycle Managementmentioning
confidence: 99%
“…Grid security architecture is primarily based on the Virtual Organisations (VO) that are created by the cooperating organisations that share resources (which however remain in their remaining in their ownership) based on mutual agreement between VO members and common VO security policy. In Grids, VO actually acts as a federation of the users and resources that enables federated access control based on the federated trust and security model [19,20].…”
Section: B Security Paradigm Shift In Cloud Computing As Infrastructmentioning
confidence: 99%
“…For grid computing the security is based on public key infrastructure (PKI). Kerberos password etc [9]. Hasan et al, introduced threat model named CIAA threat model.…”
Section: Security In Distributed Syatemmentioning
confidence: 99%