Achieving fine-grained access control in virtual organizations

被引:4
作者
Zhang, N.
Yao, L.
Nenadic, A.
Chin, J.
Goble, C.
Rector, A.
Chadwick, D.
Otenko, S.
Shi, Q.
机构
[1] Univ Manchester, Sch Comp Sci, Manchester M13 9PL, Lancs, England
[2] Univ Kent, Comp Lab, Canterbury CT2 7NF, Kent, England
[3] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool L3 3AF, Merseyside, England
基金
英国工程与自然科学研究理事会;
关键词
authentication; authorization; virtual organization; Shibboleth; PERMIS; smart tokens;
D O I
10.1002/cpe.1099
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In a virtual organization environment, where services and data are provided and shared among organizations from different administrative domains and protected with dissimilar security policies and measures, there is a need for a flexible authentication framework that supports the use of various authentication methods and tokens. The authentication strengths derived from the authentication methods and tokens should be incorporated into an access-control decision-making process, so that more sensitive resources are available only to users authenticated with stronger methods. This paper reports our ongoing efforts in designing and implementing such a framework to facilitate multi-level and multi-factor adaptive authentication and authentication strength linked fine-grained access control. The proof-of-concept prototype is designed and implemented in the Shibboleth and PERMIS infrastructures, which specifies protocols to federate authentication and authorization information and provides a policy-driven, role-based, access-control decision-making capability. Copyright (c) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:1333 / 1352
页数:20
相关论文
共 23 条
  • [1] Amin K, 2004, LECT NOTES COMPUT SC, V3033, P464
  • [2] [Anonymous], P 1 EUR GRIDS C SANT
  • [3] [Anonymous], 2004, NIST SPECIAL PUBLICA
  • [4] [Anonymous], 1998, GRID BLUEPRINT NEW C
  • [5] 'R-What?' - Development of a role-based access control policy-writing tool for e-Scientists
    Brostoff, S
    Sasse, MA
    Chadwick, D
    Cunningham, J
    Mbanaso, U
    Otenko, S
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2005, 35 (09) : 835 - 856
  • [6] A national-scale authentication infrastructure
    Butler, R
    Welch, V
    Engert, D
    Foster, I
    Tuecke, S
    Volmer, J
    Kesselman, C
    [J]. COMPUTER, 2000, 33 (12) : 60 - +
  • [7] Chadwick D, 2005, INT FED INFO PROC, V175, P251
  • [8] CHADWICK DW, 2002, P SEC INF SOC VIS PE
  • [9] CHADWICK DW, 2002, FUTURE GENER COMP SY, V936, P1
  • [10] *DATAGRID, 2005, DATAGRID PROJ