The official PGP user's guide
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Secure Component Distribution Using WebCom
SEC '02 Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Webcom-G: grid enabled metacomputing
Neural, Parallel & Scientific Computations - Special issue: Grid computing
Automating security configuration for the Grid
Scientific Programming - International Symposium of Parallel and Distributed Computing & International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogenous Networks
Synchronisation in Trust Management Using Push Authorisation
Electronic Notes in Theoretical Computer Science (ENTCS)
Hi-index | 0.00 |
Supporting security in distributed systems is becoming more important with the ongoing work in grids, distributed middlewares and web services. Decentralised security architectures allow the stakeholders in these distributed computations, the providers of both compute resources and the applications executing on them, to have a say in how a computation progresses. One of the most important issues in creating authorisation policies is how the components of these distributed applications are named. Providing a consistent and flexible naming architecture allows more fine-grained and usable security policies to be created and enforced.This paper introduces the naming architecture for the WebCom system. This architecture supports the addressing of all required information, with as much precision as is needed to create sophisticated authorisation policies.