A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Understanding PKI: Concepts, Standards, and Deployment Considerations
Understanding PKI: Concepts, Standards, and Deployment Considerations
Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services
Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services
The Grid 2: Blueprint for a New Computing Infrastructure
The Grid 2: Blueprint for a New Computing Infrastructure
Reliable Distributed Systems: Technologies, Web Services, and Applications
Reliable Distributed Systems: Technologies, Web Services, and Applications
From gridmap-file to VOMS: managing authorization in a Grid environment
Future Generation Computer Systems - Special issue: High-speed networks and services for data-intensive grids: The DataTAG project
Web Application Security Assessment Tools
IEEE Security and Privacy
Hi-index | 0.00 |
The grid problem is how to enable coordinated resources sharing and problem solving in dynamic, multi-institutional cross organizations called Virtual Organizations (VOs) that collect a large number of nodes grouped into grid sites. An overlay of policies governs access within a collaboration that is granted to users by a VO and by a site to VOs, nodes and users through site admission-control policies. Most resources consist of web applications and web services shared by a site that is part of a VO. The paper proposes an analysis of web application security by referring to XML-based applications accessed through a grid system. The different organizational domains involved transfer security from grid-wide to the VO level, and from the site and machine to the application level in order to allow local control to be retained.