ABSTRACT
Current grid security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. To overcome these problems, we have developed Audited Credential Delegation (ACD), a usable security solution for authentication, authorisation and auditing in distributed environments. ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. We will present the latest ACD developmentsi in this talk.
- B. Beckles, A. N. Haidar, S. J. Zasada, and P. V. Coveney. Audited credential delegation: A sensible approach to grid authentication. In E-Science Workshops, 2009 5th IEEE International Conference on, pages 19--30, dec. 2009.Google ScholarCross Ref
- A. E. Abdallah and A. N. Haidar. Usability Evaluation of Identity Management Schemes in Three Virtual Organisation Architectures. International Journal of Information Assurance and Security, Special Issue on Information Assurance and Data Security, 4(6):560--570, 2009.Google Scholar
- A. N. Haidar, P. V. Coveney, A. E. Abdallah, P. Y. Ryan, B. Beckles, J. M. Brooke, and M. Jones. Formal Modelling of a Usable Identity Management Solution for Virtual Organisations. Proceedings of Formal Aspects of Virtual Organisations, pages 41--50, 2009.Google Scholar
- The Open Web Application Security Project. http://ww.owasp.org.Google Scholar
- S. J. Zasada and P. V. Coveney. Virtualizing access to scientific applications with the application hosting environment. Computer Physics Communications, 180(12):2513--2525, 2009.Google ScholarCross Ref
Index Terms
- Audited credential delegation: a usable identity management solution for grid environments
Recommendations
PERMIS: a modular authorization infrastructure
UK e-Science All Hands Meeting 2006Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users. This paper describes the PERMIS role-based authorization infrastructure ...
Authentication and authorization infrastructure for Grids--issues, technologies, trends and experiences
Authentication and authorization for Grids is a challenging security issue. In this paper, key issues for the establishment of Grid authentication and authorization infrastructures are discussed, and an overview of major Grid authentication and ...
Comments