http://www.cnr.it/ontology/cnr/individuo/prodotto/ID135921
Access and Usage control in GRID systems (Contributo in volume (capitolo o saggio))
- Type
- Label
- Access and Usage control in GRID systems (Contributo in volume (capitolo o saggio)) (literal)
- Anno
- 2010-01-01T00:00:00+01:00 (literal)
- Alternative label
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- Colombo M.; Lazouski A.; Mori P.; Martinelli F. (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#citta
- Berlin Heidelberg (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
- In: Handbook of Communication and Information Security. pp. 293 - 308. Stavroulakis, Peter and Stamp, Mark (eds.). Berlin Heidelberg: Springer, 2010. (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#descrizioneSinteticaDelProdotto
- This chapter describes some approaches that have been proposed for access and usage control in grid systems. The first part of the chapter addresses the security challenges in grid systems and describes the standard security infrastructure provided by the Globus Toolkit, the most used middleware to establish grids. Since the standard Globus authorization system provides very basic mechanisms that do not completely fulfill the requirements of this environment, a short overview of well-known access control frameworks that have been integrated in Globus is also given: Community Authorization Service (CAS), PERMIS, Akenti, Shibboleth, Virtual Organization Membership Service (VOMS), Cardea, and PRIMA. Then, the chapter describes the usage control model UCON, a novel model for authorization, along with an implementation of UCON in grid systems. The last part of the chapter describes the authorization model for grid computational services designed by the Grid Trust project. This authorization (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- Titolo
- Access and Usage control in GRID systems (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#inCollana
- Handbook of Communication and Information Security (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Editore di
- Insieme di parole chiave di