Abstract
Pervasive Grids emerge as a new paradigm for providing nomadic users with ubiquitous access to digital information and computing resources. However, pervasive grids arise a number of crucial issues related to privacy and security, especially authentication and access control, which constitute the security front-end.
In this paper, we propose a trust based model of authentication and access control that allows nomadic users to roam from site to site and to gain access to surrounding/remote resources wrt her status in her home site and to the local policy of the site where she is standing. This model is supported by a software architecture called Chameleon.
The Chameleon permits users to access grid resources and to implement adhoc interactions with the local grid site.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)
Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communications journal, 10-17 (Aug. 2001)
Shankar, N., Arbaugh, W.: On Trust for Ubiquitous Computing. In: Workshop on Security in Ubiquitous Computing (Sep. 2004)
Seitz, L., Pierson, J.M., Brunie, L.: Semantic Access Control for Medical Applications in Grid Environments. In: International Conference on Parallel and Distributed Computing, Aug. 2003, pp. 374–383 (2003)
Aloisio, G., et al.: Grid Computing in the Web Using the Globus Toolkits. Editor HPCN Europe, pp. 32-40 (2000)
Chadwick, D., Otenko, A.: The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, Jun. 2002, pp. 135–140 (2002)
Lorch, M., et al.: The PRIMA System for Privilege Management, Authorization and Enforcement. In: Proceedings of the 4th International Workshop on Grid Computing (Nov. 2003)
ITU-T Rec. X.509, ISO/IEC 9594-8 The Directory: Authentication Framework (2000)
ITU-T Simple public key infrastructure (SPKI) charter, http://www.ietf.org/html.charters/OLD/spki-charter.html
Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proceedings of the ACM Workshop on New Security Paradigms, Sep. 1997, pp. 48–60 (1997)
Harrison, M.H., Ruzzo, W.L., Ullman, J.D.: Protection in Operating Systems. Communications of the ACM 19(8), 461–471 (1976)
Bell, D.E.: A Refinement of the Mathematical Model. Technical Report ESD-TR-278, vol. 3, The Mitre Corp., Bedford, MA (1973)
Sandhu, R., et al.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
Saadi, R., Pierson, J.M., Brunie, L.: X316: Morph Access Pass certificate. Technical Report, INSA de Lyon France (2006)
Chaari, T., et al.: Modeling and Using Context in Adapting Applications to Pervasive Environments. In: Proceedings of the IEEE International Conference on Pervasive Services (ICPS’06), Lyon, France, Jun. 2006, pp. 111–120 (2006)
Basney, J., et al.: Negotiating trust on the grid. In: 2nd WWW Workshop on Semantics in P2P and Grid Computing (May 2004)
Saadi, R., Pierson, J., Brunie, L. (Dis)trust Certification Model for Large Access in Pervasive Environment. JPCC International Journal of Pervasive Computing and Communications 1(4), 289–299 (2005)
Sklavos, N., Koufopavlou, O.: Mobile Communications World: Security Implementations Aspects - A State of the Art. CSJM Journal, Institute of Mathematics and Computer Science 11(32), 168–187 (2003)
Imamura, T., Dillaway, B., Simon, E.: XML-signature syntax and processing. In: W3C Recommendation (Dec. 2002), http://www.w3.org/TR/2002/REC-xmlenc-core-20021210/
Bartel, M., et al.: XML-encryption syntax and processing. In: W3C Recommendation (Feb. 2002), http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Saadi, R., Pierson, J.M., Brunie, L. (2007). Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environments. In: Cérin, C., Li, KC. (eds) Advances in Grid and Pervasive Computing. GPC 2007. Lecture Notes in Computer Science, vol 4459. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72360-8_30
Download citation
DOI: https://doi.org/10.1007/978-3-540-72360-8_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72359-2
Online ISBN: 978-3-540-72360-8
eBook Packages: Computer ScienceComputer Science (R0)