Skip to main content

Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environments

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4459))

Abstract

Pervasive Grids emerge as a new paradigm for providing nomadic users with ubiquitous access to digital information and computing resources. However, pervasive grids arise a number of crucial issues related to privacy and security, especially authentication and access control, which constitute the security front-end.

In this paper, we propose a trust based model of authentication and access control that allows nomadic users to roam from site to site and to gain access to surrounding/remote resources wrt her status in her home site and to the local policy of the site where she is standing. This model is supported by a software architecture called Chameleon.

The Chameleon permits users to access grid resources and to implement adhoc interactions with the local grid site.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)

    Google Scholar 

  2. Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communications journal, 10-17 (Aug. 2001)

    Google Scholar 

  3. Shankar, N., Arbaugh, W.: On Trust for Ubiquitous Computing. In: Workshop on Security in Ubiquitous Computing (Sep. 2004)

    Google Scholar 

  4. Seitz, L., Pierson, J.M., Brunie, L.: Semantic Access Control for Medical Applications in Grid Environments. In: International Conference on Parallel and Distributed Computing, Aug. 2003, pp. 374–383 (2003)

    Google Scholar 

  5. Aloisio, G., et al.: Grid Computing in the Web Using the Globus Toolkits. Editor HPCN Europe, pp. 32-40 (2000)

    Google Scholar 

  6. Chadwick, D., Otenko, A.: The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, Jun. 2002, pp. 135–140 (2002)

    Google Scholar 

  7. Lorch, M., et al.: The PRIMA System for Privilege Management, Authorization and Enforcement. In: Proceedings of the 4th International Workshop on Grid Computing (Nov. 2003)

    Google Scholar 

  8. ITU-T Rec. X.509, ISO/IEC 9594-8 The Directory: Authentication Framework (2000)

    Google Scholar 

  9. ITU-T Simple public key infrastructure (SPKI) charter, http://www.ietf.org/html.charters/OLD/spki-charter.html

  10. Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proceedings of the ACM Workshop on New Security Paradigms, Sep. 1997, pp. 48–60 (1997)

    Google Scholar 

  11. Harrison, M.H., Ruzzo, W.L., Ullman, J.D.: Protection in Operating Systems. Communications of the ACM 19(8), 461–471 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  12. Bell, D.E.: A Refinement of the Mathematical Model. Technical Report ESD-TR-278, vol. 3, The Mitre Corp., Bedford, MA (1973)

    Google Scholar 

  13. Sandhu, R., et al.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)

    Google Scholar 

  14. Saadi, R., Pierson, J.M., Brunie, L.: X316: Morph Access Pass certificate. Technical Report, INSA de Lyon France (2006)

    Google Scholar 

  15. Chaari, T., et al.: Modeling and Using Context in Adapting Applications to Pervasive Environments. In: Proceedings of the IEEE International Conference on Pervasive Services (ICPS’06), Lyon, France, Jun. 2006, pp. 111–120 (2006)

    Google Scholar 

  16. Basney, J., et al.: Negotiating trust on the grid. In: 2nd WWW Workshop on Semantics in P2P and Grid Computing (May 2004)

    Google Scholar 

  17. Saadi, R., Pierson, J., Brunie, L. (Dis)trust Certification Model for Large Access in Pervasive Environment. JPCC International Journal of Pervasive Computing and Communications 1(4), 289–299 (2005)

    Article  Google Scholar 

  18. Sklavos, N., Koufopavlou, O.: Mobile Communications World: Security Implementations Aspects - A State of the Art. CSJM Journal, Institute of Mathematics and Computer Science 11(32), 168–187 (2003)

    MATH  Google Scholar 

  19. Imamura, T., Dillaway, B., Simon, E.: XML-signature syntax and processing. In: W3C Recommendation (Dec. 2002), http://www.w3.org/TR/2002/REC-xmlenc-core-20021210/

  20. Bartel, M., et al.: XML-encryption syntax and processing. In: W3C Recommendation (Feb. 2002), http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Christophe Cérin Kuan-Ching Li

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Saadi, R., Pierson, J.M., Brunie, L. (2007). Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environments. In: Cérin, C., Li, KC. (eds) Advances in Grid and Pervasive Computing. GPC 2007. Lecture Notes in Computer Science, vol 4459. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72360-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72360-8_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72359-2

  • Online ISBN: 978-3-540-72360-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics