skip to main content
10.1145/2016741.2016774acmotherconferencesArticle/Chapter ViewAbstractPublication PagestgConference Proceedingsconference-collections
research-article

Audited credential delegation: a usable identity management solution for grid environments

Published:18 July 2011Publication History

ABSTRACT

Current grid security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. To overcome these problems, we have developed Audited Credential Delegation (ACD), a usable security solution for authentication, authorisation and auditing in distributed environments. ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. We will present the latest ACD developmentsi in this talk.

References

  1. B. Beckles, A. N. Haidar, S. J. Zasada, and P. V. Coveney. Audited credential delegation: A sensible approach to grid authentication. In E-Science Workshops, 2009 5th IEEE International Conference on, pages 19--30, dec. 2009.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. E. Abdallah and A. N. Haidar. Usability Evaluation of Identity Management Schemes in Three Virtual Organisation Architectures. International Journal of Information Assurance and Security, Special Issue on Information Assurance and Data Security, 4(6):560--570, 2009.Google ScholarGoogle Scholar
  3. A. N. Haidar, P. V. Coveney, A. E. Abdallah, P. Y. Ryan, B. Beckles, J. M. Brooke, and M. Jones. Formal Modelling of a Usable Identity Management Solution for Virtual Organisations. Proceedings of Formal Aspects of Virtual Organisations, pages 41--50, 2009.Google ScholarGoogle Scholar
  4. The Open Web Application Security Project. http://ww.owasp.org.Google ScholarGoogle Scholar
  5. S. J. Zasada and P. V. Coveney. Virtualizing access to scientific applications with the application hosting environment. Computer Physics Communications, 180(12):2513--2525, 2009.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Audited credential delegation: a usable identity management solution for grid environments

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          TG '11: Proceedings of the 2011 TeraGrid Conference: Extreme Digital Discovery
          July 2011
          256 pages
          ISBN:9781450308885
          DOI:10.1145/2016741

          Copyright © 2011 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 18 July 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
        • Article Metrics

          • Downloads (Last 12 months)1
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader