Abstract
The emergence of grid and cloud computing systems has introduced new security concepts, so it requires new access control approaches. Traditional systems engineering processes can be enriched with helper approaches that can facilitate the definition of access control requirements in such complex environments. Looking towards a holistic approach on the definition of access control requirements, we propose a four-layer conceptual categorization. In addition, an example is given so that to demonstrate the utilization of the proposed categorization in a grid scenario for defining access control requirements, and evaluate their fulfilment vis-à-vis contemporary employed access control approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid - enabling scalable virtual organizations. International Journal of Supercomputer Applications 15 (2001)
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, GCE 2008, pp. 1–10 (2008)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)
Sandhu, R., Park, J.: Usage control: A vision for next generation access control. Computer Network Security, 17–31 (2003)
Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur. 11(1), 1–36 (2008)
Yuan, E., Tong, J.: Attributed Based Access Control (ABAC) for Web Services. In: Proceedings of the IEEE ICWS, pp. 561–569. IEEE Computer Society, Los Alamitos (2005)
Busch, S., Muschall, B., Pernul, G., Priebe, T.: Authrule: A generic rule-based authorization module, DBSec. Springer, Heidelberg (2006)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)
Sandhu, R., Bhamidipati, V.: The ASCAA principles for next-generation role-based access control. In: Availability, Reliability and Security, ARES 2008 (2008)
Chadwick, D.W., Otenko, A., Ball, E.: Role-based access control with X.509 attribute certificates. IEEE Internet Computing 7(2), 62–69 (2003)
GridTrust: Gridtrust (2009), http://www.gridtrust.eu/gridtrust
Priebe, T., Dobmeier, W., Kamprath, N.: Supporting attribute-based access control with ontologies. In: ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security, Washington, DC, USA, pp. 465–472. IEEE Computer Society, Los Alamitos (2006)
Alexander Kipp, S.W., Lutz Schubert, R.P., Horst Schwichtenberg, C.T., Karanastasis, E.: A new approach for classifying grids. Technical report, BEinGRID (2008)
Gridipedia: Types of grid (2009), http://www.gridipedia.eu/types-of-grids.html
Kurdi, H., Li, M., Al-Raweshidy, H.: A classification of emerging and traditional grid systems. IEEE Distributed Systems Online 9(3), 1 (2008)
SETI@home (2009), http://setiathome.ssl.berkeley.edu/
EGEE: Enabling grids for e-science, EGEE (2009), http://eu-egee.org/
BOINC: Boinc all projects statistics - distributed computing statistics (2009), http://www.allprojectstats.com/
Gridmap: Gridmap visualizing the “state” of the grid (2009), http://gridmap.cern.ch/gm
Green, D.: Grid technology. The future of the internet? The future of it (2002), https://ludit.kuleuven.be/nieuws/pdf/grid.pdf
Krauter, K., Buyya, R., Maheswaran, M.: A taxonomy and survey of grid resource management systems for distributed computing. Softw. Pract. Exper. 32(2), 135–164 (2002)
Broadfoot, P.J., Martin, A.P.: A critical survey of grid security requirements and technologies. Technical Report RR-03-15, Oxford University Computing Laboratory (2003)
Kephart, J.: Research challenges of autonomic computing. In: Software Engineering, ICSE 2005. Proceedings, pp. 15–22 (2005)
Chakrabarti, A.: Grid Computing Security, Managing Trust in the Grid. Springer, Heidelberg (2007)
Veit, D.J., Altmann, J. (eds.): GECON 2007. LNCS, vol. 4685. Springer, Heidelberg (2007)
Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29–41 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Gouglidis, A., Mavridis, I. (2010). On the Definition of Access Control Requirements for Grid and Cloud Computing Systems. In: Doulamis, A., Mambretti, J., Tomkos, I., Varvarigou, T. (eds) Networks for Grid Applications. GridNets 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 25. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11733-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-11733-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11732-9
Online ISBN: 978-3-642-11733-6
eBook Packages: Computer ScienceComputer Science (R0)