Authorization for metacomputing applications

被引:2
|
作者
Gheorghiu, G [1 ]
Ryutov, T [1 ]
Neuman, BC [1 ]
机构
[1] Univ So Calif, Inst Informat Sci, Marina Del Rey, CA 90292 USA
关键词
D O I
10.1109/HPDC.1998.709965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most difficult problems to be solved by meta-computing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved in a metacomputing environment often span multiple administrative domains, each with its own security policy. This paper presents a distributed authorization model used by our resource allocation system, the Prospero Resource Manager [8]. The main components of our design are Extended Access Control Lists, EACLs, and a General Authorization and Access API, GAA API. EACLs extend conventional ACLs to allow conditional restrictions on access rights. In the case of the Prospero Resource Manager; specific restrictions include limits on the computational resources to be consumed and on the characteristics of the applications to be executed by the system, such as name, version or endorser The GAA API provides a general frame-work for applications to access the EACLs. We have built a prototype of the system.
引用
收藏
页码:132 / 139
页数:2
相关论文
共 50 条
  • [31] Nexus Authorization Logic (NAL): Design Rationale and Applications
    Schneider, Fred B.
    Walsh, Kevin
    Sirer, Emin Guen
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [32] Supporting Agile Development of Authorization Rules for SME Applications
    Bartsch, Steffen
    Sohr, Karsten
    Bormann, Carsten
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2009, 10 : 461 - 471
  • [33] Metacomputing, an emerging technology?
    Lüthi, HP
    COMPUTER PHYSICS COMMUNICATIONS, 2000, 128 (1-2) : 326 - 332
  • [34] A Proposed Framework for the Automated Authorization Testing of Mobile Applications
    Alghamdi, Ahmed Mohammed
    Almarhabi, Khalid
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (05): : 217 - 221
  • [35] Visual authorization modeling in e-commerce applications
    Chang, SK
    Polese, G
    Cibelli, M
    Thomas, R
    IEEE MULTIMEDIA, 2003, 10 (01) : 44 - 54
  • [36] A decentralized authorization mechanism for e-business applications
    Miklós, Z
    13TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2002, : 446 - 450
  • [37] How to adapt Authentication and Authorization Infrastructure of applications for the Cloud
    Tri Hoang Vo
    Fuhrmann, Woldemar
    Fischer-Hellmann, Klaus-Peter
    2017 IEEE 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2017), 2017, : 54 - 61
  • [38] Issues in the design of secure authorization service for distributed applications
    Varadharajan, V
    Crall, C
    Pato, J
    GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION, 1998, : 874 - 879
  • [39] Hybrid Authentication and Authorization Model for Web based Applications
    Indu, I.
    Anand, P. M. Rubesh
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1187 - 1191
  • [40] WebSolver:: User friendly metacomputing
    Lindström, E
    Widmark, U
    HIGH-PERFORMANCE COMPUTING AND NETWORKING, 1998, 1401 : 978 - 980