Role-Based Access Control Architecture in Grid Environments
Abstract
Keywords
Full Text:
PDFReferences
I. Foster, C. Kesselman, “The Grid: Blueprint for a new Computing Infrastructure", Morgan Kaufmann Publishers, ISBN 1-55860-475-8, 1999.
I. Foster, C. Kesselman, and S. Tuecke. “The Anatomy of the Grid: Enabling Scalable Virtual Organizations”. International Journal of High Performance Supercomputing Applications, vol: 15, no: 3, 2001.
Miguel L. Bote-Lorenzo, Yannis A. Dimitriadis, Eduardo Gmez-Snchez, ”Grid Characteristics and Uses: A Grid Definition", In European across Grids Conference, Santiago de Compostela, Spain, pp: 291-298, 2003.
Marty Humphrey, Mary R Thomson and Keith R Jackson, “Security for Grids", Proceedings of the IEEE, Vol 93, No 3, pp: 644-652, 2005.
Von Welch, Frank Siebenlist, Ian T. Foster, John Bresnahan, Karl Cza-jkowski, Jarek Gawor, Carl Kesselman, Sam Meder, Laura Pearlman, Steven Tuecke, “Security for Grid Services", In 12th International Symposium on High-Performance Distributed Computing, Seattle, WA, USA, pp: 359-368, 22-24, June 2003.
Jiri Denemark, Michał Jankowski, Ludek Matyska, Norbert Meyer, Miroslav Ruda, Pawel Wolniewicz, "User Management for Virtual Organizations", CoreGRID Integration Workshop Proceedings, Pisa 2005.
Glen Wasson and Marty Humphrey, “Policy and Enforcement in Virtual Organizations”, In 4th International Workshop on Grid Computing (Grid2003) Phoenix, AZ., pp: 125-133, 2003.
Cui-xiao Zhang, Ying-xin Hu, Guo-bing Zhang, "Task-Role Based Dual System Access Control Model", IJCSNS International Journal of Computer Science and Network Security, Vol.6, No.7, pp: 211-215, July 2006.
Sandhu, R., Ferraiolo, D., and Kuhn, R. “The NIST model for role-based access control: Towards a unified standard”. In Proceedings of 5th ACM Workshop on Role- Based Access Control, pp: 47-63, 2000.
Ganesh Godavari and Edward Chow, "Secure Information Sharing Using Attribute Certificates and Role Based Access Control", In Proceedings of Security and Management'2005, pp: 269-276, 2005.
Uday O. Ali Pabrai, "HIPAA Security and Role Based Access Control (RBAC),"HIPAA Academy, September 5, 2003.
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. “Role-based access control models”, IEEE Computer, Vol: 29, No: 2, pp: 38–47, 1996.
Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart, "Reconfiguring Role Based Access Control Policies Using Risk Semantics", Journal of High Speed Networks, Vol: 15, No: 3, pp: 261-273, 2006.
Globus Project. Globus Project Web Site, 2009. http://www.globus.org/.
Anil L. Pereira, Vineela Muppavarapu, and Soon M. Chung, "Role-Based Access Control for Grid Database Services Using the Community Authorization Service", IEEE Transactions On Dependable And Secure Computing, Vol. 3, No: 2, 2006.
J.B.D. Joshi, R. Bhatti, E. Bertino, and A. Ghafoor, “Access-Control Language for Multi-domain Environments,” IEEE Internet Computing, Vol. 8, No. 6, pp. 40-50, Nov.-Dec. 2004.
T. Mayfield, J.E. Roskos, S.R. Welke, and J.M. Boone, “Integrity in Automated Information Systems,” technical report, Nat’l Computer Security Center, pp: 79-91, 1991
Jongil Jeong, Weehyuk Yu, Dongkyoo Shin, Dongil Shin, Kiyoung Moon, and Jaeseung Lee, "Integration of Single Sign-On and Role-Based Access Control Profiles for Grid Computing", 8th Asia-Pacific Web Conference on Frontiers of WWW Research and Development , Vol: 3841, pp. 880-885, January 16-18, 2006.
Lorenzo Cirio, Isabel F. Cruz, and Roberto Tamassia, "A Role and Attribute Based Access Control System Using Semantic Web Technologies", In Int. IFIP Workshop on Semantic Web and Web Semantics, volume 4806 of Lecture Notes in Computer Science, pp: 1256-1266. Springer, 2007.
Chen Ying, Yang Shoubao, Guo Leitao, Liu Pengzhan, Shen Kai, "Design and Implementation of Dynamic-Role Based Access Control Framework in Grid Environment", International Conference on Information Technology: Coding and Computing, Vol: 2, pp: 758- 759, 2005.
Nathan Dimmock, Andras Belokosztolszki, David Eyers, Jean Bacon, Ken Moody, "Using Trust and Risk in Role-Based Access Control Policies", Proceedings of the ninth ACM symposium on Access control models and technologies, pp: 156 - 162, 2004.
G Geethakumari, Atul Negi, V.N Sastry, "A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems", IJCSA, Vol: 6, No: 1, 2009.
M.Nithya, R.S.D.Wahidabanu, "Towards Novel and efficient security architecture for Role Based access control in grid computing”, IJCSNS Vol 1, No: 3, 2009.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.