Conflicts in Policy-Based Distributed Systems Management
IEEE Transactions on Software Engineering
Common information model: implementing the object model for enterprise management
Common information model: implementing the object model for enterprise management
Creating Semantic Web Contents with Protégé-2000
IEEE Intelligent Systems
KAON - Towards a Large Scale Semantic Web
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
HPDC '03 Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
A Policy Language for a Pervasive Computing Environment
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
A Practical Approach to WBEM/CIM Management
A Practical Approach to WBEM/CIM Management
Jena: implementing the semantic web recommendations
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
AICT-ICIW '06 Proceedings of the Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services
A Multipolicy Authorization Framework for Grid Security
NCA '06 Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications
Pellet: A practical OWL-DL reasoner
Web Semantics: Science, Services and Agents on the World Wide Web
PERMIS: a modular authorization infrastructure
Concurrency and Computation: Practice & Experience - UK e-Science All Hands Meeting 2006
Translation of Common Information Model to Web Ontology Language
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part I: ICCS 2007
A Kerberos security architecture for web services based instrumentation grids
Future Generation Computer Systems
Authorisation in Grid computing
Information Security Tech. Report
Query Answering for OWL-DL with rules
Web Semantics: Science, Services and Agents on the World Wide Web
On usage control for GRID systems
Future Generation Computer Systems
Globus toolkit version 4: software for service-oriented systems
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
The SWRC ontology – semantic web for research communities
EPIA'05 Proceedings of the 12th Portuguese conference on Progress in Artificial Intelligence
FaCT++ description logic reasoner: system description
IJCAR'06 Proceedings of the Third international joint conference on Automated Reasoning
A secure broadcasting cryptosystem and its application to grid computing
Future Generation Computer Systems
An ontology-centric architecture for extensible scientific data management systems
Future Generation Computer Systems
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage
Future Generation Computer Systems
Semantic-aware multi-tenancy authorization system for cloud architectures
Future Generation Computer Systems
Hi-index | 0.00 |
There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization policies in Grid scenarios. However, these solutions usually do not provide Grid administrators with semantic-aware components closer to the particular Grid domain and easing different administration tasks such as conflict detection or resolution. This paper defines a proposal based on Semantic Web to define, manage and enforce security policies in a Grid scenario. These policies are defined by means of semantic-aware rules which help the administrator to create higher-level definitions with more expressiveness. These rules also permit performing added-value tasks such as conflict detection and resolution, which can be of interest in medium and large scale scenarios where different administrators define the authorization rules that should be followed before accessing a resource in the Grid. The proposed solution has been also tested providing some reasonable response times in the authorization decision process.