Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids
Ajay Prasad, Saurabh Singh Verma, Ashok Kumar Sharma
Pages - 48 - 64 | Revised - 30-09-2009 | Published - 21-10-2009
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Grid security, Authorization, Virtual Organization, Policy based authorization, Policy mappings
ABSTRACT
Services oriented grids will be more prominent among other kinds of grids in the present distributed environments. With the advent of online government services the governmental grids will come up in huge numbers. Apart from common security issues as in other grids, the authorization in service oriented grids faces certain shortcomings and needs to be looked upon differently. The CMMS model presented here overcomes all these shortcomings and adds to the simplicity of implementation because of its tight similarities with certain government services and their functioning. The model is used to prototype a State Police Information Grid (SPIG). Small technological restructuring is required in PKIX and X.509 certificates.
1 | Nithya, M., & Varadarajan, V. (2013). An Security Architecture for Campus Virtual Organization Using Role Based Access Control. Life Science Journal, 10(7s). |
2 | Manro, R., & Joshi, A. S. (2013).Utilization the power of cloud computing to offer e-governance services through saas model. International Journal of Information Technology & Computer Sciences Perspectives, 2(2), 565. |
3 | Prasad, A., Chaurasia, S., Singh, A., & Gour, D. (2010). Mapping Cloud computing onto useful E-Governance. International Journal of Computer Science, 8(5). |
Adam J. Lee, Marianne Winslett, Safety and Consistency in Policy Based Authorization, Department of Computer Science, University of Illinois at Urbana Champaign 2006. | |
Bart Jacob, Michael Brown, Kentaro Fukui, Nihar Trivedi. Introduction to Grid Computing, ibm.com/redbooksibm.com/redbooks. IBM Corporation Dec 2005. | |
Chang-Soon Choi, Member IEEE Vozo Shoji Member IEEE and Hiroyo Ogawa Fello “millimeter wave fiber fed wireless access systems based on dense wavelength division multiplexing networks” IEEE transactions on microwave theory and techniques vol 56 no1 January 2008 | |
Guangsen Zhang, Manish Parashar, Dynamic Context-aware Access Control for Grid Applications, Proceedings of the Fourth International Workshop on Grid Computing (GRID’03), IEEE 2003. | |
Ionut Constandache, Daniel Olmedilla, and Wolfgang Nejdl, Policy Based Dynamic Negotiation for Grid Services Authorization, Semantic Web Policy Workshop, ISWC’05 Alway, Ireland, 7th November 2005. | |
J. Basney, W. Nejdl, D. Olmedilla, V. Welch, and M. Winslett, "Negotiating trust on the grid," in Proc. 2nd Workshop on Semantics in P2P and Grid Computing, 2004. www.ncsa.illinois.edu/~jbasney/sempgrid.pdf. | |
J. Vollbrecht, P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. De Bruijn, C. De Laat, M. Holdrege, D. Spence. AAA Authorization Framework Request For Comments 2904, Network Working Group (2000). http://www.Ietf.Org/Rfc/Rfc2904.Txt. | |
K. M. Chandy and L. Lamport. Distributed snapshots: Determining global states of distributed systems. ACM Transactions on Computer Systems, 3(1):63–75, Feb. 1985. | |
Laura Pearlman, Von Welch, Ian Foster, Carl Kesselman, Steven Tuecke. A Community Authorization Service for Group Collaboration.http://www.globus.org/alliance/publications/papers/CAS_2002_Revised.pdf | |
M. Lorch, D. Adams, D. Kafura, M. Koneni, A. Rathi, and S. Shah. The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments. In Proceedings of the 4th Int. Workshop on Grid Computing - Grid 2003, Phoenix, AZ, USA,Nov. 2003. | |
M. R. Thompson, A. Essiari, K. Keahey, V, Welch, S. Lang, B. Liu, Fine-Grained Authorization for Job and Resource Management Using Akenti and the Globus Toolkit, CHEP 03, La Jolla, Mar 24-28, 2003. | |
Marty Humphrey, Member, IEEE, Mary R. Thompson, Member, IEEE, And Keith R. Jackson, Security for Grids, Proceedings Of The IEEE, Vol. 93, No. 3, March 2005. | |
R. Alfieri, R. Cecchini, V. Ciaschini, L. dell’Agnello, A. Frohner, A. Gianoli, K. L?orentey, and F. Spataro. VOMS: An Authorization System for Virtual Organizations. In proceedings of the 1st European Across Grids Conference, Santiago de Compostela, Feb. 2003. | |
R. Gröper, Policy-based Authorization for Grid Data-Management, Master Thesis, University of Hannover, 2006. | |
S Farrell, R Housley. An Internet Attribute Certificate Profile for Authorization. Request For Comments 3281, Network Working Group (2002). | |
S. Farrell, J. Vollbrecht, P. Calhoun, L. Gommans, G. Gross, B. De Bruijn, C. De Laat, M. Holdrege, D. Spence. AAA Authorization Requirements. Request For Comments 2906, Network Working Group (2000). http://www.Ietf.Org/Rfc/Rfc2096.Txt. | |
Sarbjeet Singh, and Seema Bawa, A Privacy, Trust and Policy based Authorization Framework for Services in Distributed Environments, International Journal of Computer Science Volume 2 Number 2, 2007. | |
Mr. Ajay Prasad
- India
aprasad.et@mitsuniversity.ac.in
Mr. Saurabh Singh Verma
- India
Professor Ashok Kumar Sharma
Mody Institute of Technology and Science - India
|
|
|
|
View all special issues >> | |
|
|