Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Communications of the ACM
An architecture for a secure service discovery service
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
An access control framework for multi-user collaborative environments
GROUP '99 Proceedings of the international ACM SIGGROUP conference on Supporting group work
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Flexible team-based access control using contexts
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Maintenance-Free Global Data Storage
IEEE Internet Computing
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Anonymizing Censorship Resistant Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Mnemosyne: Peer-to-Peer Steganographic Storage
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Role-Based Access Control With X.509 Attribute Certificates
IEEE Internet Computing
Cryptographic access control in a distributed file system
Proceedings of the eighth ACM symposium on Access control models and technologies
PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Certificate-based authorization policy in a PKI environment
ACM Transactions on Information and System Security (TISSEC)
Facilitating Secure Ad hoc Service Discovery in Public Environments
COMPSAC '03 Proceedings of the 27th Annual International Conference on Computer Software and Applications
The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
MPEG Video Encryption Algorithms
Multimedia Tools and Applications
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
Secure attribute-based systems
Proceedings of the 13th ACM conference on Computer and communications security
Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing
ECOWS '06 Proceedings of the European Conference on Web Services
A survey of trust and reputation systems for online service provision
Decision Support Systems
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Authorisation in Grid computing
Information Security Tech. Report
Policy-based cryptography and applications
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Bringing semantics to web services: the OWL-S approach
SWSWPC'04 Proceedings of the First international conference on Semantic Web Services and Web Process Composition
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Access control: principle and practice
IEEE Communications Magazine
Hi-index | 0.01 |
This paper describes the security framework that is to be developed for the generic grid platform created for the project GREDIA. This platform is composed of several components that need to be secured. The platform uses the OGSA standards, so that the security framework will follow GSI, the portion of Globus that implements security. Thus, we will show the security features that GSI already provides and we will outline which others need to be created or enhanced.