Role-Based Access Control Models
Computer
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The grid: blueprint for a new computing infrastructure
The grid: blueprint for a new computing infrastructure
Protection in operating systems
Communications of the ACM
ACM SIGAda Ada Letters
The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
Modeling and Using Context in Adapting Applications to Pervasive Environments
PERSER '06 Proceedings of the 2006 ACS/IEEE International Conference on Pervasive Services
Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments
Proceedings of the 2009 international conference on Pervasive services
L'Elimination de la subjectivité dans la recommandation de confiance
Proceedings of the 5th French-Speaking Conference on Mobility and Ubiquity Computing
X316 security toolbox for new generation of certificate
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Hi-index | 0.00 |
Pervasive Grids emerge as a new paradigm for providing nomadic users with ubiquitous access to digital information and computing resources. However, pervasive grids arise a number of crucial issues related to privacy and security, especially authentication and access control, which constitute the security front-end. In this paper, we propose a trust based model of authentication and access control that allows nomadic users to roam from site to site and to gain access to surrounding/remote resources wrt her status in her home site and to the local policy of the site where she is standing. This model is supported by a software architecture called Chameleon. The Chameleon permits users to access grid resources and to implement adhoc interactions with the local grid site.