The widespread use of grid technology and distributed compute power, with all its inherent benefits, will only be established if the use of that technology can be guaranteed efficient and secure. The predominant method for currently enforcing security is through the use of public key infrastructures (PKI) to support authentication and the use of access control lists (ACL) to support authorisation. These systems alone do not provide enough fine-grained control over the restriction of user rights, necessary in a dynamic grid environment. This paper compares the implementation and experiences of using the current standard for grid authorisation with Globus - the grid security infrastructure (GSI) - with the role-based access control (RBAC) aut...
This paper describes the research conducted into advanced authorization infrastructures at the Natio...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...
Privilege Management Infrastructures (PMI) are emerging as a necessary alternative to authorization ...
The widespread use of grid technology and distributed compute power, with all its inherent benefits,...
© 2005 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
This is a post-print of an article whose final and definitive form has been published in Lecture Not...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
This paper briefly surveys how authorisation in Grid computing has evolved during the last few years...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
The emergence of Grid computing technology is being followed by three main security concerns: the in...
Security underpins Grids and e-Research. Without a\ud robust, reliable and simple Grid security infr...
Security underpins grids and e-research. Without a robust, reliable and simple grid security infrast...
Authentication and authorization for Grids is a challenging security issue. In this paper, key issue...
This paper describes the research conducted into advanced authorization infrastructures at the Natio...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...
Privilege Management Infrastructures (PMI) are emerging as a necessary alternative to authorization ...
The widespread use of grid technology and distributed compute power, with all its inherent benefits,...
© 2005 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
This is a post-print of an article whose final and definitive form has been published in Lecture Not...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
This paper briefly surveys how authorisation in Grid computing has evolved during the last few years...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
The emergence of Grid computing technology is being followed by three main security concerns: the in...
Security underpins Grids and e-Research. Without a\ud robust, reliable and simple Grid security infr...
Security underpins grids and e-research. Without a robust, reliable and simple grid security infrast...
Authentication and authorization for Grids is a challenging security issue. In this paper, key issue...
This paper describes the research conducted into advanced authorization infrastructures at the Natio...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...
Privilege Management Infrastructures (PMI) are emerging as a necessary alternative to authorization ...