The widespread use of grid technology and distributed compute power, with all its inherent benefits, will only be established if the use of that technology can be guaranteed efficient and secure. The predominant method for currently enforcing security is through the use of public key infrastructures (PKI) to support authentication and the use of access control lists (ACL) to support authorisation. These systems alone do not provide enough fine-grained control over the restriction of user rights, necessary in a dynamic grid environment. This paper compares the implementation and experiences of using the current standard for grid authorisation with Globus - the grid security infrastructure (GSI) - with the role-based access control (RBAC) aut...
This paper describes the results of our recent GridShibPERMIS project to provide policy-driven role-...
Authorization infrastructures manage privileges and render access control decisions, allowing applic...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...
The widespread use of grid technology and distributed compute power, with all its inherent benefits,...
© 2005 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
This is a post-print of an article whose final and definitive form has been published in Lecture Not...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
This paper briefly surveys how authorisation in Grid computing has evolved during the last few years...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
Privilege Management Infrastructures (PMI) are emerging as a necessary alternative to authorization ...
The emergence of Grid computing technology is being followed by three main security concerns: the in...
Simplifying access to and usage of large scale compute resources via the grid is of critical importa...
Security underpins grids and e-research. Without a robust, reliable and simple grid security infrast...
This paper describes the results of our recent GridShibPERMIS project to provide policy-driven role-...
Authorization infrastructures manage privileges and render access control decisions, allowing applic...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...
The widespread use of grid technology and distributed compute power, with all its inherent benefits,...
© 2005 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
This is a post-print of an article whose final and definitive form has been published in Lecture Not...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
This paper briefly surveys how authorisation in Grid computing has evolved during the last few years...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured th...
Privilege Management Infrastructures (PMI) are emerging as a necessary alternative to authorization ...
The emergence of Grid computing technology is being followed by three main security concerns: the in...
Simplifying access to and usage of large scale compute resources via the grid is of critical importa...
Security underpins grids and e-research. Without a robust, reliable and simple grid security infrast...
This paper describes the results of our recent GridShibPERMIS project to provide policy-driven role-...
Authorization infrastructures manage privileges and render access control decisions, allowing applic...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...