Semantic-Aware Access Control for Grid Application

被引:0
作者
Chen, Xiyuan [1 ]
Yang OUYang [1 ]
Zhu, Miaoliang [1 ]
He, Yan [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou, Zhejiang, Peoples R China
来源
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5 | 2008年
关键词
Semantic-Aware; access control; grid application;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The emerging Grid infrastructure presents many challenging security issues that demand new access approach due to its inherent heterogeneity, multidomain characteristic and highly dynamic nature. In order to protect the secure sharing and coordinated use of diverse resources in distributed "virtual organizations", fine-grained access control in grid computing is therefore very necessary and important. In this paper, a semantic-aware access conrtol(SAAC) extending the RBAC with the semantic specification is proposed. Supplying semantic specification by the implementation of Semantic Inference Engine (SIE), the administration for the applicability of users' role memberships to particular permissions is much more easy and precise. The enforcement of the SAAC model for grid application is presented An experimental evaluation of its overheads is also described.
引用
收藏
页码:971 / 975
页数:5
相关论文
共 11 条
[1]  
[Anonymous], P IEEE 3 INT WORKSH
[2]   The anatomy of the grid: Enabling scalable virtual organizations [J].
Foster, I ;
Kesselman, C ;
Tuecke, S .
INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS, 2001, 15 (03) :200-222
[3]  
Foster I., 1998, P 5 ACM C COMP COMM, P83, DOI DOI 10.1145/288090.288111
[4]   The evolution of Protege:: an environment for knowledge-based systems development [J].
Gennari, JH ;
Musen, MA ;
Fergerson, RW ;
Grosso, WE ;
Crubézy, M ;
Eriksson, H ;
Noy, NF ;
Tu, SW .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2003, 58 (01) :89-123
[5]  
JOHNSTON W, 1998, P IEEE 7 INT WORKSH
[6]  
Osborn S., 2000, ACM Transactions on Information and Systems Security, V3, P85, DOI 10.1145/354876.354878
[7]   Role-based access control for grid database services using the community authorization service [J].
Pereira, AL ;
Muppavarapu, V ;
Chung, SM .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (02) :156-166
[8]  
Qiang WZ, 2004, LECT NOTES COMPUT SC, V3032, P487
[9]  
Sandhu R., 2001, ACM T INFORM SYSTEM, V4, P224
[10]  
Sandhu Ravi S, 1998, Advances in computers, V46, P237