Attribute-Based Authorization for Grid Computing

被引:0
|
作者
Khider, Husam [1 ]
Osman, Taha [1 ]
Sherkat, Nasser [1 ]
机构
[1] Nottingham Trent Univ, Nottingham, England
关键词
SAML; XACML; PKI; SUNXACML; SSO; SP; IdP; VO; AAProxy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
the development of adequate security solutions and in particular of authorization techniques for grid computing systems is a challenging task. Traditional security trends tried to overcome this problem by using a low-level access control policy which maps a user's identity to a local account. This approach is not scalable and is hard to manage in a distributed environment. Current trends started adopting approaches that pass attributes for authorization instead of passing user's credentials. The problem still hasn't been solved completely primarily because it uses PKI (Public Key Infrastructure) user certificate for authorization, and the main problem with this approach is the inflexibility of the PKI infrastructure when it comes to open distributed systems (Grid). Additionally implementations of attribute-based authorization have largely adopted the XML based SAML (Security Assertion Markup Language) and XACML (eXtensible Access Control Markup Language) standards for authentication and authorization. The author investigates an approach that uses XACML for Authorizations and utilizes a proxy for the attribute authority to allow for the distribution of attribute requests to numerous attribute authorities to whom the user is subscribed.
引用
下载
收藏
页码:71 / 74
页数:4
相关论文
共 50 条
  • [1] A concept for attribute-based authorization on D-Grid resources
    Groeper, Ralf
    Grimm, Christian
    Makedanz, Siegfried
    Pfeiffenberger, Hans
    Ziegler, Wolfgang
    Gietz, Peter
    Schiffers, Michael
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING-THEORY METHODS AND APPLICATIONS, 2009, 25 (03): : 275 - 280
  • [2] Guaranteeing anonymity in attribute-based authorization
    Lanus, Erin
    Colbourn, Charles J.
    Ahn, Gail-Joon
    Journal of Information Security and Applications, 2024, 87
  • [3] Authorization Recycling in Attribute-Based Access Control
    An Y.
    Helil N.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [4] Privacy-preserving attribute-based access control for grid computing
    Park, Sang M.
    Chung, Soon M.
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (04) : 286 - 296
  • [5] Attribute-based interactions in a distributed authentication and authorization infrastructure
    López, DR
    Castro-Rojo, R
    14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 438 - 442
  • [6] Attribute-Based Authorization Tickets for Car-to-X Communication
    Buettner, Carsten
    Huss, Sorin A.
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 234 - 242
  • [7] Multi-authority Decentralized Attribute-Based Authorization Framework
    Sok, Kimheng
    Colin, Jean Noel
    Po, Kimtho
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS (CAISE 2022), 2022, 451 : 18 - 30
  • [8] Verification of X.509 Attribute Certificates for Attribute-based Authorization: A Practical Approach
    Berbecaru, Diana
    2021 25TH INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2021, : 346 - 351
  • [9] Attribute-based transactions in service oriented computing
    Bocchi, Laura
    Tuosto, Emilio
    MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2015, 25 (03) : 619 - 665
  • [10] Survey on attribute-based encryption in cloud computing
    Ancy, P.R.
    Krishna, Addapalli V.N.
    Balachandran, K.
    Balamurugan, M.
    Prakasi, O.S. Gnana
    Ancy, P.R. (ancy.prasadam@res.christuniversity.in), 1600, Femto Technique Co., Ltd. (22): : 863 - 868