首页    期刊浏览 2024年11月15日 星期五
登录注册

文章基本信息

  • 标题:A Stringent Authorization using Principles and Policy for Grid Computing
  • 本地全文:下载
  • 作者:Jayasudha, A. R. ; Purusothaman, T.
  • 期刊名称:Journal of Computer Science
  • 印刷版ISSN:1549-3636
  • 出版年度:2011
  • 卷号:7
  • 期号:8
  • 页码:1295-1301
  • DOI:10.3844/jcssp.2011.1295.1301
  • 出版社:Science Publications
  • 摘要:Problem statement: The current information security mechanisms are insufficient to address authorization issues. The access control models today are mostly static and they are not wellsuited for the service-oriented environments where information access is dynamic in nature. Traditional authorization security techniques do not directly address these concerns as they primarily use access control lists for authorization, where the user whose name appears in the list is authorized to access the grid with some privileges associated with the names, which requires the resource provider to maintain authorization decisions for every user, which is very time consuming and non-scalable solution. Approach: Organizations pass user roles instead of name and date of birth but it used Public Key Infrastructure user certificate for authorization which is inflexible when it comes to open distributed systems (Grid) as it assumes a pre-agreed trust between Service Provider and the Service consumer. Usage of Java authentication and authorization services is performed in a pluggable fashion. It permits the application to remain independent from underlying authentication technology. Results: Our implementation provides service providers with full control over authentication and authorization of accounts that access services. Implementation of the proposed technique has proved to be less time consuming and more secured for authentication and authorization as compared to the traditional way of authenticating the users. The Policy Decision Service is envisioned to be used by many Web services protected by their PEPs. Conclusion: The model brings out many advantages over traditional identity. It is more flexible and more powerful and is suited for dynamic environments for Web services.
  • 关键词:Public key; authentication technology; underlying authentication; policy file; web services; preferred customers; authorization decision; login module; decision point; traditional authorization; authorization service; login module
国家哲学社会科学文献中心版权所有