LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Sinnott, R.O.; Stell, A.J.; Watt, J. (2005)
Publisher: IEEE
Languages: English
Types: Other
Subjects: QA75
The development of teaching materials for future software engineers is critical to the long term success of the grid. At present however there is considerable turmoil in the grid community both within the standards and the technology base underpinning these standards. In this context, it is especially challenging to develop teaching materials that have some sort of lifetime beyond the next wave of grid middleware and standards. In addition, the current way in which grid security is supported and delivered has two key problems. Firstly in the case of the UK e-Science community, scalability issues arise from a central certificate authority. Secondly, the current security mechanisms used by the grid community are not line grained enough. In this paper we outline how these issues are being addressed through the development of a grid computing module supported by an advanced authorisation infrastructure at the University of Glasgow.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Johnston, W., Mudumbai, S., Thompson, M. Authorization and Attribute Certificates for Widely Distributed Access Control, IEEE 7th Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Stanford, CA, June, 1998, p340-345 (http://www-itr.lbl.gov/securitv/Akenti/)
    • [2] L Pearlman, et al., A Community Authorisation Service for Group Collaboration, in Proceedings of the IEEE 3rd Intermational Workshop on Policies for Distributed Systems and Networks. 2002.
    • [3] Lepro, R., Cardea: Dynamic Access Control in Distributed Systems, NASA Technical Report NAS03-020, November 2003
    • [4] Globus Grid Security Infrastructure, http:lwwwunix.globus.org/toolkit/docs/3.2/gsi/index.html
    • [5] D.W.Chadwick, A. Otenko, E.Ball, Role-based Access Control with X.509 Attribute Certificates, IEEE Intemet Computing, Mar-April 2003, pp. 62-69.
    • [6] D.W.Chadwick, A. Otenko, The PERMIS X.509 Role Based Privilege Management Infrastructure, Future Generation Computer Systems, 936 (2002) 1- 13, December 2002. Elsevier Science BV. [71 Privilege and Role Management Infrastructure Standards Validation project www.permnis.org [8] VOMS Architecture, European Datagrid Authorization Working group, 5 September 2002. [91 Steven Newhouse, Virtual Organisation Management, The London E-Science centre, http://www.lesc.ic.ac.uk/proiects/oscar-n.html.
    • [11] Dynamic Virtual Organisations in e-Science Education project (DyVOSE), www.nesc.ac.uk/hub/pr-)jects/dvvose
    • [12] Globus, http:H/www.g.obus.org
    • [13] R. Housley, T. Polk, Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructures, Wiley Computer Publishing, 2001.
    • [14] ITU-T Recommendation X.509 (2001) 1 ISO/IEC 9594-8: 2001, Information technology - Open Systems Interconnection - Public-Key and Attribute Certificate Frameworks.
    • [15] JISC Authentication, Authorisation and Accounting (AAA) Programme Technologies for Information Environment Security (TIES), htto://www.edina.ac.uklprojects/ties/ties 23-9.pdf.
    • [16] Whitten, A., and Tygar, J. D. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. Paper presented at the gth USENIX security symposium, Washington, 1999.
    • [17] D. Chadwick, 0. Otenko, A Comparison of the Akenti and PERMIS Authorization Infrastructures, in Ensuring Security in IT Infrastructures, Proceedings of ITI First Intemational Conference on Information and Communications Technology (ICICT 2003) Cairo University, Ed. Mahmoud T El-Hadidi, pS-26, 2003
    • [18] Conceptual AuthZ Framework and Classification, https://forge.gridforum.org/docman2/ViewCategory.p hp?groupi_d=55&categorv id=458
    • [19] A.J. Stell, Grid Security: An Evaluation of Authorisation Infrastructures for Grid Computing, MSc Dissertation, University of Glasgow, 2004.
    • [20] ITU-T Rec. X.509 (2000) 1 ISO/IEC 9594-8. The Directory: Authentication Framework.
    • [21] UK e-Science Certification Authority. www.gridsupportac.uk [221 ITU-T Rec X.812 (1995) ISO/IEC 10181- 3:1996, Security Frameworks for open systems: Access control framework
    • [23] V. Welch, F. Siebenlist. D. Chadwick, S. Meder, L. Pearlman, Use of SAML for OGSA Authorization, June 2004, https://forge.gridforum.org/projects/orscaauthz
    • [24] OASIS. Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) vi . 1,. 2 September 2003, http:flwww.oasisopen.org/committees/securitv/
    • [25] OpenSSL to create certifilcates, ht.tp://www.flatmtn.com/computer/Lin.uixSSLCertificates.html
    • [26] J. Jokl, J. Basney and M. Humphrey, Experiences using Bridge CAs for Grids, Proceedings of UK Workshop on Grid Security Practice - Oxford, July 2004
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article