This paper attempts to accurately model security requirements for computational grid environments with particular focus on authentication. We introduce the Audited Credential Delegation (ACD) architecture as a solution to some of the virtual organisations (VO) identity management usability problems. The approach uses two complementary models: one is state based, described in Z no-tation, and the other is event-based, expressed in the Process Algebra of Hoares Communicating Sequential Processes (CSP). The former will be used to capture the state of the VO and to model “back-end ” operations on it whereas the latter will be used to model behavior, and in particular, “front-end ” interactions and communications. The modelling helps to clearly ...
This paper compares and contrasts authentication mechanisms used in three VO architectures: the firs...
In a client-server environment that deals with multiple clients,there is a need to provide a mechani...
Recently, identity management has gained increasing attention from both enterprises and government o...
This paper attempts to accurately model security requirements for computational grid environments wi...
One major problem faced by end-users and administrators of computational grid environments arise in ...
Abstract—The Virtual Organization (VO) has emerged as a fundamental way of structuring modern scient...
Virtual organization (VO) is an important abstraction for designing large-scale distributed applicat...
In grids, delegation is a key facility that can be used to authenticate and authorize requests on be...
One of the fundamental concepts in Grid computing is the creation of Virtual Organizations (VO's): a...
As more businesses engage in globalization, inter-organizational collaborative computing grows in im...
A Virtual Organisation (VO) is a temporary alliance of autonomous, diverse, and geographically dispe...
In large open networks, handling trust and authenticity adequately is an important prerequisite for ...
The paper proposes an integral approach to building multilayer security for Grid based virtual colla...
Business process integration can be complex when it spans organisations. Current grid technology aim...
Business process integration can be complex when it spans organisations. Existing grid technology ai...
This paper compares and contrasts authentication mechanisms used in three VO architectures: the firs...
In a client-server environment that deals with multiple clients,there is a need to provide a mechani...
Recently, identity management has gained increasing attention from both enterprises and government o...
This paper attempts to accurately model security requirements for computational grid environments wi...
One major problem faced by end-users and administrators of computational grid environments arise in ...
Abstract—The Virtual Organization (VO) has emerged as a fundamental way of structuring modern scient...
Virtual organization (VO) is an important abstraction for designing large-scale distributed applicat...
In grids, delegation is a key facility that can be used to authenticate and authorize requests on be...
One of the fundamental concepts in Grid computing is the creation of Virtual Organizations (VO's): a...
As more businesses engage in globalization, inter-organizational collaborative computing grows in im...
A Virtual Organisation (VO) is a temporary alliance of autonomous, diverse, and geographically dispe...
In large open networks, handling trust and authenticity adequately is an important prerequisite for ...
The paper proposes an integral approach to building multilayer security for Grid based virtual colla...
Business process integration can be complex when it spans organisations. Current grid technology aim...
Business process integration can be complex when it spans organisations. Existing grid technology ai...
This paper compares and contrasts authentication mechanisms used in three VO architectures: the firs...
In a client-server environment that deals with multiple clients,there is a need to provide a mechani...
Recently, identity management has gained increasing attention from both enterprises and government o...