{"title":"An access control model for grid computing based on security information evaluation","authors":"Ping Xie, Jiang Zhou","doi":"10.1109/FBIE.2009.5405804","DOIUrl":null,"url":null,"abstract":"There are multiple administrative domains in a grid environment where each domain has a policy space of their own. Generally, a mobile process usually travels from one policy space to another. However, current grid security infrastructure lacks in support of mobile processes in grid environment. This paper presents a credit quantitative criterion for a mobile process, and realizes security information evaluation according to these quantitative criteria. Relevant algorithms are designed to decide whether a mobile process is allowed to perform an operation. By using the dynamical access control mechanism based on security information evaluation, the flexibility of mobile processes and availability of network security facilities are enhanced.","PeriodicalId":333255,"journal":{"name":"2009 International Conference on Future BioMedical Information Engineering (FBIE)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Future BioMedical Information Engineering (FBIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FBIE.2009.5405804","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
There are multiple administrative domains in a grid environment where each domain has a policy space of their own. Generally, a mobile process usually travels from one policy space to another. However, current grid security infrastructure lacks in support of mobile processes in grid environment. This paper presents a credit quantitative criterion for a mobile process, and realizes security information evaluation according to these quantitative criteria. Relevant algorithms are designed to decide whether a mobile process is allowed to perform an operation. By using the dynamical access control mechanism based on security information evaluation, the flexibility of mobile processes and availability of network security facilities are enhanced.