Towards context constrained authorisation for pervasive grid computing

J. S. Chin, N. Zhang, A. Nenadic, L. Yao, J. M. Brooke

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Abstract

    This paper describes our on-going work on the design and development of a Context Constrained Authorisation Architecture to support Pervasive Grid Computing. It discusses security implications when bridging Pervasive Computing and Grid Computing, and analyses the limitations of current Grid authorisation solutions in this Pervasive Grid environment. We propose some novel Grid authorisation enhancements that takes into account not only users' static attributes, but also their dynamic Contextual Attributes inherent in Pervasive Computing. The design has adhered to open Grid standards and specifications, and is based upon a modular layered approach so that any existing or emerging authorisation mechanisms or solutions can easily be plugged into or unplugged from the architecture. In addition, the architecture can inter-work with and be easily integrated with other Grid security building blocks. © 2007 IEEE.
    Original languageEnglish
    Title of host publicationProceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007|Proc. Int. Conf. Commun. Syst. Softw. Middleware Workshops
    Place of PublicationWashington, DC, USA
    PublisherIEEE Computer Society
    ISBN (Print)1424406145, 9781424406142
    DOIs
    Publication statusPublished - 2007
    Event2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007 - Bangalore
    Duration: 1 Jul 2007 → …

    Conference

    Conference2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007
    CityBangalore
    Period1/07/07 → …

    Keywords

    • Computer Science, Hardware & Architecture
    • Computer Science,
    • Information Systems
    • Computer Science, Software Engineering
    • Computer
    • Science, Theory & Methods

    Fingerprint

    Dive into the research topics of 'Towards context constrained authorisation for pervasive grid computing'. Together they form a unique fingerprint.

    Cite this