Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Burnap, Peter; Hilton, Jeremy Charles (2009)
Publisher: IEEE
Languages: English
Types: Unknown
Subjects: QA75
The emergence of high-speed networks,\ud Grid Computing, Service-Oriented Architectures, and\ud an ever increasing ambient connection to mobile Internet has enabled an underpinning infrastructure for\ud the development of dynamically formed, collaborative working groups known as Virtual Organisations (VOs).\ud VOs provide strong motivation for investigation into\ud the infrastructure, and in particular the security necessary to protect the information and resources shared within a VO, both while resident on local machines and when allowed to move beyond the secure boundary of a local organisational network perimeter and into the realm of the distributed VO. Traditional access control systems are perimeter- centric, meaning they apply the controls to both internal and external requests for access to information within or at the perimeter of their information system. • This paper presents the initial results of the JISC funded SPIDER project, being led by Cardiff University. Through case based example, the research investigates the limitations to granularity and persistent control over information when using the perimeter- centric approach in a collaborative working environment.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Foster, I., Kesselman, C., The Grid 2: blueprint for a new computing infrastructure, 2nd Ed, San Francisco, Calif.: Morgan Kaufman, 2003
    • [2] Foster, I., Kesselman, C. Tuecke, S., The Anatomy of the Grid, Enabling Scalable Virtual Organisations. Intl J. Supercomputer Applications, 15(3), 2001
    • [3] Alfieri, R., et al. VOMS, an Authorization System for Virtual Organizations . In Proceedings of the 1st European Across Grids Conference, Santiago de Compostela 2003
    • [4] Chadwick, D. W. and Otenko, A. 2003. The PERMIS X.509 role based privilege management infrastructure. Future Gener. Comput. Syst. 19, 2 (Feb. 2003), 277-289.
    • [5] ShARPE Project Web Site : http://www.mams.org.au/confluence/display/SHA/ShARPE;j sessionid=EC9B1D9DE1EFF3E275979B6499BE867B
    • [6] Introduction to iRODS : https://www.irods.org/index.php/Introduction_to_iRODS
    • [7] Liu, Q., Safavi-Naini, R., and Sheppard, N. P. 2003. Digital rights management for content distribution. In Proceedings of the Australasian information Security Workshop Conference on ACSW Frontiers 2003 - Volume 21 (Adelaide, Australia).
    • [8] Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., and Samarati, P. 2002. A fine-grained access control system for XML documents. ACM Trans. Inf. Syst. Secur. 5, 2 (May. 2002), 169-202. [9] Bertino, E., Castano, S., and Ferrari, E. 2001. On specifying security policies for web documents with an XML-based language. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (Chantilly, Virginia, United States).
    • [10] Abelson, H et al. ccREL: The Creative Commons Rights Expression Language. Found at: http://wiki.creativecommons.org/images/d/d6/Ccrel-1.0.pdf
    • [11] Java Web Start. Found at: http://java.sun.com/javase/technologies/desktop/javawebstart /index.jsp
    • [12] Docvert Tool, available at: http://holloway.co.nz/docvert/
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article