Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security

被引:0
作者
Ruckmani, V. [1 ]
Sadasivam, G. Sudha [2 ]
机构
[1] Sri Ramakrishna Engn Coll, Dept MCA, Coimbatore, Tamil Nadu, India
[2] PSG Coll Technol, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
来源
INFORMATION PROCESSING AND MANAGEMENT | 2010年 / 70卷
关键词
Security; Trigon-based Authentication; Authorization; Authorization Protocol; Grid;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a vital part of an integrated grid application in which heterogeneous services and resources belonging to multiple domains are distributed dynamically. Authentication and authorization are the major security concerns in grid environment. Most of the grid security mechanisms stress on authentication, and not on authorization. This paper proposes to integrate an authorization protocol with the effective trigon-based authentication technique based on the user's role. This integrated trigon-based authentication - authorization protocol provides effective grid security in an efficient manner.
引用
收藏
页码:125 / +
页数:2
相关论文
共 5 条
  • [1] [Anonymous], P 5 ACM COMP COMM SE, DOI DOI 10.1145/288090.288111
  • [2] Geethakumari G., 2009, INT J COMPUT SCI APP, V6, P1
  • [3] HONGWEIA L, 2008, J SYSTEMS ENG ELECT, V19, P860
  • [4] Enhancing grid security by fine-grained behavioral control and negotiation-based authorization
    Koshutanski, Hristo
    Lazouski, Aliaksandr
    Martinelli, Fabio
    Mori, Paolo
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (04) : 291 - 314
  • [5] RUCKMANI V, 2009, INT J COMPUTER SCI I, V6, P64