Enhancing Java ME Security Support with Resource Usage Monitoring
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Fine-Grained Continuous Usage Control of Service Based Grids --- The GridTrust Approach
ServiceWave '08 Proceedings of the 1st European Conference on Towards a Service-Based Internet
Fine grained access control with trust and reputation management for globus
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Enhancing Java security with history based access control
Foundations of security analysis and design IV
On usage control for GRID systems
Future Generation Computer Systems
Distributed usage control architecture for business coalitions
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Enforcing UCON policies on the enterprise service bus
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Influence of attribute freshness on decision making in usage control
STM'10 Proceedings of the 6th international conference on Security and trust management
A fine-grained and x.509-based access control system for globus
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part II
A distributed authorization system with mobile usage control policies
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part I
Survey: Usage control in computer security: A survey
Computer Science Review
Data usage control enforcement in distributed systems
Proceedings of the third ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Security in the grid environment is a challenging issue, because this environment instantiates interactions among a set of possibly unknown entities where no trust relationships may exist a priori, or when such relationships are not strong enough for specific applications. In this paper we propose to integrate a local monitor into the grid computational service architecture, to control the behavior of applications executed on behalf of grid users. Our approach is inspired to the concept of continuous usage control rather then simply access control to monitor the security relevant interactions of these applications with the requested services. We also describe the prototype of computational service monitor we have developed and its integration within the Globus framework.