Evaluation of Authentication-Authorization Tools for VO security

نویسندگان

  • Jake Wu
  • Panos Periorellis
چکیده

GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual organizations in order to exploit market opportunities. The project aims to deliver the enabling technology to support the creation, operation and successful dissolution of such virtual organizations. A set of middleware technologies has been designed and being implemented to address issues such as trust, security, contract management and monitoring, information management, etc. for virtual collaboration between companies. In this poster presentation, we will showcase some of the more general requirements for authentication and authorization aspects in GOLD virtual organizations. In conjunction with these requirements we evaluate some of the more popular tools that are currently available in dealing with these issues, together with our own approach that addresses these problems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review of Security Models Applied to Distributed Data Access

In this paper, we explore the technologies behind the security models applied to distributed data access in a Grid environment. Our goal is to study a security model allowing data integrity, confidentiality, authentication and authorization for VO users. We split the process for data access in three levels: Grid authentication, Grid authorization, local enforcement. For each level, we introduce...

متن کامل

A Secure Model to Establish Trust Relationships in Web Services for Virtual Organizations

This paper introduces a model making use of the security proposals based on Web Services architecture that aims to provide guarantees authentication and authorization transfer among different security domains. The model describes a flexible, scalable and secure way to establish trust relationships among Virtual Organization partners and to assign the access rights or roles to each partner in th...

متن کامل

Authorization Strategies for Virtualized Environments in Grid Computing Systems

The development of adequate security solutions, and in particular of authentication and authorization techniques, for grid computing systems is a challenging task. Recent trends of service oriented architectures (SOA), where users access grids through a science gateway — a web service that serves as a portal between users of a virtual organizations (VO) and the various computation resources, fu...

متن کامل

AnApproach for Shibboleth and Grid Integration

Grid environments involve complex scenarios where PKI-based authentication and authorization might have to be delegated across n-tier security domains. Shibboleth is an identity management system designed to exchange attributes across domains for the primary purpose of authorization and its architecture is highly dependent on PKI. Supported by a Registry Service, we propose a non-intrusive appr...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006