An Access Control Model for Grid Computing Based on Security Information Evaluation

被引:0
|
作者
Xie, Ping [1 ]
Zhou, Jiang [1 ]
机构
[1] N China Elect Power Univ, Dept Comp Sci, Beijing 102206, Peoples R China
关键词
grid computing; access control; security; credit certificate;
D O I
10.1109/FBIE.2009.5405804
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
There are multiple administrative domains in a grid environment where each domain has a policy space of their own. Generally, a mobile process usually travels from one policy space to another. However, current grid security infrastructure lacks in support of mobile processes in grid environment. This paper presents a credit quantitative criterion for a mobile process, and realizes security information evaluation according to these quantitative criteria. Relevant algorithms are designed to decide whether a mobile process is allowed to perform an operation. By using the dynamical access control mechanism based on security information evaluation, the flexibility of mobile processes and availability of network security facilities are enhanced.
引用
收藏
页码:49 / 52
页数:4
相关论文
共 50 条
  • [1] Agent-based access control security in grid computing environment
    Lin, J
    Wang, C
    Guo, YH
    [J]. 2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, : 159 - 162
  • [2] Community-based model and access control for information grid
    Li, XL
    Xu, ZW
    Liu, XW
    Yang, N
    [J]. IEEE/WIC INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, PROCEEDINGS, 2003, : 462 - 465
  • [3] Ontology-based data access control model supported with grid computing for improving security in healthcare data
    Kiran, G. M.
    Nalini, N.
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (11)
  • [4] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [5] An access control architecture based on SPKI in Computing Grid
    Li, BH
    Hou, YB
    Chen, XH
    [J]. DCABES 2002, PROCEEDING, 2002, : 182 - 184
  • [6] Security grid technology based on information security control theory
    Yuan, Jia-Bin
    Gu, Kai-Kai
    Yao, Li
    [J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2007, 31 (04): : 422 - 425
  • [7] Comparison and Evaluation of Information Security Models for Access Control
    Anton, Nicolae
    Nedelcu, Anisor
    [J]. ENGINEERING SOLUTIONS AND TECHNOLOGIES IN MANUFACTURING, 2014, 657 : 708 - 712
  • [8] Flexible authorization with decentralized access control model for grid computing
    Zhang, Xinwen
    Li, Qi
    Seifert, Jean-Pierre
    Xu, Mingwei
    [J]. HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 156 - +
  • [9] Towards Novel And Efficient Security Architecture For RoleBased Access Control In Grid Computing
    Nithya, M.
    Banu, R. S. D. Wahida
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 12 - 19
  • [10] A Security Evaluation of Chaos Attribute-Based Access Control (ABAC) for Cloud Computing
    BenMarak, Omessead
    Naanaa, Anis
    Elasmi, Sadok
    [J]. ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 3, AINA 2024, 2024, 201 : 415 - 425