Achieving fine-grained access control in virtual organizations

被引:4
作者
Zhang, N.
Yao, L.
Nenadic, A.
Chin, J.
Goble, C.
Rector, A.
Chadwick, D.
Otenko, S.
Shi, Q.
机构
[1] Univ Manchester, Sch Comp Sci, Manchester M13 9PL, Lancs, England
[2] Univ Kent, Comp Lab, Canterbury CT2 7NF, Kent, England
[3] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool L3 3AF, Merseyside, England
基金
英国工程与自然科学研究理事会;
关键词
authentication; authorization; virtual organization; Shibboleth; PERMIS; smart tokens;
D O I
10.1002/cpe.1099
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In a virtual organization environment, where services and data are provided and shared among organizations from different administrative domains and protected with dissimilar security policies and measures, there is a need for a flexible authentication framework that supports the use of various authentication methods and tokens. The authentication strengths derived from the authentication methods and tokens should be incorporated into an access-control decision-making process, so that more sensitive resources are available only to users authenticated with stronger methods. This paper reports our ongoing efforts in designing and implementing such a framework to facilitate multi-level and multi-factor adaptive authentication and authentication strength linked fine-grained access control. The proof-of-concept prototype is designed and implemented in the Shibboleth and PERMIS infrastructures, which specifies protocols to federate authentication and authorization information and provides a policy-driven, role-based, access-control decision-making capability. Copyright (c) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:1333 / 1352
页数:20
相关论文
共 23 条
[1]  
Amin K, 2004, LECT NOTES COMPUT SC, V3033, P464
[2]  
[Anonymous], P 1 EUR GRIDS C SANT
[3]  
[Anonymous], 2004, NIST SPECIAL PUBLICA
[4]  
[Anonymous], 1998, GRID BLUEPRINT NEW C
[5]   'R-What?' - Development of a role-based access control policy-writing tool for e-Scientists [J].
Brostoff, S ;
Sasse, MA ;
Chadwick, D ;
Cunningham, J ;
Mbanaso, U ;
Otenko, S .
SOFTWARE-PRACTICE & EXPERIENCE, 2005, 35 (09) :835-856
[6]   A national-scale authentication infrastructure [J].
Butler, R ;
Welch, V ;
Engert, D ;
Foster, I ;
Tuecke, S ;
Volmer, J ;
Kesselman, C .
COMPUTER, 2000, 33 (12) :60-+
[7]  
Chadwick D, 2005, INT FED INFO PROC, V175, P251
[8]  
CHADWICK DW, 2002, P SEC INF SOC VIS PE
[9]  
CHADWICK DW, 2002, FUTURE GENER COMP SY, V936, P1
[10]  
*DATAGRID, 2005, DATAGRID PROJ