A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Role-Based Access Control With X.509 Attribute Certificates
IEEE Internet Computing
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
The MyProxy online credential repository: Research Articles
Software—Practice & Experience - Grid Security
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
CCGRID '08 Proceedings of the 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid
Shibboleth-based Access to and Usage of Grid Resources
GRID '06 Proceedings of the 7th IEEE/ACM International Conference on Grid Computing
From gridmap-file to VOMS: managing authorization in a Grid environment
Future Generation Computer Systems - Special issue: High-speed networks and services for data-intensive grids: The DataTAG project
SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure
SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure
An automatic intrusion diagnosis approach for clouds
International Journal of Automation and Computing
WPS mediation: An approach to process geospatial data on different computing backends
Computers & Geosciences
Nephele: Scalable Access Control for Federated File Services
Journal of Grid Computing
A lightweight authorization mechanism for spatially enabled health data services
Proceedings of the Second ACM SIGSPATIAL International Workshop on the Use of GIS in Public Health
Policy-driven role-based access management for ad-hoc collaboration
Journal of Computer Security
Hi-index | 0.00 |
Grid computing facilitates resource sharing typically to support distributed virtual organizations (VO). The multi-institutional nature of a grid environment introduces challenging security issues, especially with regard to authentication and authorization. This article presents a state-of-the-art review of major grid authentication and authorization technologies. In particular we focus upon the Internet2 Shibboleth technologies and their use to support federated authentication and authorization to support interinstitutional sharing of remote grid resources that are subject to access control. We outline the architecture, features, advantages, limitations, projects, and applications of Shibboleth in a grid environment. The evidence suggests that Shibboleth meets many of the demands of the research community in accessing and using grid resources.