A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Role-Based Access Control With X.509 Attribute Certificates
IEEE Internet Computing
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
The MyProxy online credential repository: Research Articles
Software—Practice & Experience - Grid Security
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
Development of a flexible PERMIS authorisation module for shibboleth and apache server
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure
SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure
Shibboleth and community authorization services: enabling role-based grid access
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Journal of Network and Computer Applications
Hi-index | 0.00 |
Authentication and authorization for Grids is a challenging security issue. In this paper, key issues for the establishment of Grid authentication and authorization infrastructures are discussed, and an overview of major Grid authentication and authorization technologies is presented. Related to this, recent developments in Grid authentication and authorization infrastructures suggest adoption of the Shibboleth technology which offers advantages in terms of usability, confidentiality, scalability and manageability. When combined with advanced authorization technologies, Shibboleth-based authentication and authorization infrastructures provide role-based, fine-grained authorization. We share our experience in constructing a Shibboleth-based authentication and authorization infrastructure and believe that such infrastructure provides a promising solution for the security of many application domains.