Security in computing
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Supporting Secure Ad-hoc User Collaboration in Grid Environments
GRID '02 Proceedings of the Third International Workshop on Grid Computing
The PERMIS X.509 role based privilege management infrastructure
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Certificate-based authorization policy in a PKI environment
ACM Transactions on Information and System Security (TISSEC)
From gridmap-file to VOMS: managing authorization in a Grid environment
Future Generation Computer Systems - Special issue: High-speed networks and services for data-intensive grids: The DataTAG project
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
Access control management for ubiquitous computing
Future Generation Computer Systems
A Kerberos security architecture for web services based instrumentation grids
Future Generation Computer Systems
A PMI-aware extension for the SSH service
PPAM'07 Proceedings of the 7th international conference on Parallel processing and applied mathematics
Key aspects of the UNICORE 6 security model
Future Generation Computer Systems
Compromise through USB-based Hardware Trojan Horse device
Future Generation Computer Systems
Assured resource sharing in Grid environments
International Journal of Information and Computer Security
International Journal of Applied Mathematics and Computer Science - SPECIAL SECTION: Efficient Resource Management for Grid-Enabled Applications
Editorial: Recent developments in high performance computing and security: An editorial
Future Generation Computer Systems
Technology Acceptance Model Applied to the Adoption of Grid and Cloud Technology
International Journal of Grid and High Performance Computing
Hi-index | 0.00 |
Computational grids can be considered as tiered objects; following a widespread terminology, cluster grids may be grouped into enterprise grids, that in turn may belong to global grids. Therefore, computing grid security has to be ''tiered'' too, with the ground level remaining the OS one. In this work, we introduce a sort of unified approach, an overall architectural framework for access control to grid resources, and one that adheres as much as possible to current security principles. Current grid security implementations are viewed in the light of this model, their main drawbacks are described, and we show how our proposal is able to avoid them. We believe that a main strategy could be to adopt both PKI and PMI infrastructures at the grid layer, ensuring that an adequate transfer of authentication and authorization will be made between the Virtual Organization and Resource Provider layers. This can be achieved by extending those features at the OS layer as system applications and services.