Dynamic Access Control for Pervasive Grid Applications

The current grid security research efforts focus on static scenarios where access depends on the identity of the subject. They do not address access control issues for pervasive grid applications where the access privileges of a subject not only depend on their identity but also on their current con...

Full description

Saved in:
Bibliographic Details
Published inComputational Intelligence and Security pp. 348 - 355
Main Authors Naqvi, Syed, Riguidel, Michel
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2005
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783540308195
3540308199
ISSN0302-9743
1611-3349
DOI10.1007/11596981_52

Cover

Loading…
Abstract The current grid security research efforts focus on static scenarios where access depends on the identity of the subject. They do not address access control issues for pervasive grid applications where the access privileges of a subject not only depend on their identity but also on their current context (i.e. current time, location, system resources, network state, etc). Our approach complements current authorization mechanisms by dynamically granting permission to users based on their current context. The underlying dynamic and context aware access control model extends the classic role based access control, while retaining its advantages (i.e. ability to define and manage complex security policies). The major strength of our proposed model is its ability to make access control decision dynamically according to the context information. Its dynamic property is particularly useful for pervasive grid applications.
AbstractList The current grid security research efforts focus on static scenarios where access depends on the identity of the subject. They do not address access control issues for pervasive grid applications where the access privileges of a subject not only depend on their identity but also on their current context (i.e. current time, location, system resources, network state, etc). Our approach complements current authorization mechanisms by dynamically granting permission to users based on their current context. The underlying dynamic and context aware access control model extends the classic role based access control, while retaining its advantages (i.e. ability to define and manage complex security policies). The major strength of our proposed model is its ability to make access control decision dynamically according to the context information. Its dynamic property is particularly useful for pervasive grid applications.
Author Riguidel, Michel
Naqvi, Syed
Author_xml – sequence: 1
  givenname: Syed
  surname: Naqvi
  fullname: Naqvi, Syed
  email: naqvi@enst.fr
  organization: Computer Sciences and Networks Department, Graduate School of Telecommunications, Paris, France
– sequence: 2
  givenname: Michel
  surname: Riguidel
  fullname: Riguidel, Michel
  email: riguidel@enst.fr
  organization: Computer Sciences and Networks Department, Graduate School of Telecommunications, Paris, France
BookMark eNpNUDtPxDAYC3BI9I5O_IGuDIV8eTZjVeBAOgkGmKs0SVGgJFVyOol_T3kMeLFlyx68RqsQg0PoAvAVYCyvAbgSqoGekyO0ppxhujgNP0YFCICaUqZOUKlk85PhBhRfoWJRpFaS0TNU5vyGFzBFmBAFEjefQX94U7XGuJyrLoZ9ilM1xlQ9uXTQ2R9ctU3eVu08T97ovY8hn6PTUU_ZlX-8QS93t8_dfb173D507a7OgBmpDbOUWWe50E6MalAGKMOWN5JgMw5WEtBKScsWzUALbvUgB760MHAnDd2gy9_dPCcfXl3qhxjfcw-4_z6k_3cI_QIbFU7V
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2005
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2005
DOI 10.1007/11596981_52
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Mathematics
Computer Science
EISBN 3540315985
9783540315988
EISSN 1611-3349
Editor Yin, Hujun
Ma, Jianfeng
Jiao, Licheng
Liu, Jiming
Hao, Yue
Cheung, Yiu-ming
Jiao, Yong-Chang
Wang, Yu-Ping
Editor_xml – sequence: 1
  givenname: Yue
  surname: Hao
  fullname: Hao, Yue
  email: yhao@xidian.edu.cn
– sequence: 2
  givenname: Jiming
  surname: Liu
  fullname: Liu, Jiming
  email: jiming@comp.hkbu.edu.hk
– sequence: 3
  givenname: Yu-Ping
  surname: Wang
  fullname: Wang, Yu-Ping
  email: ywang@xidian.edu.cn
– sequence: 4
  givenname: Yiu-ming
  surname: Cheung
  fullname: Cheung, Yiu-ming
  email: ymc@comp.hkbu.edu.hk
– sequence: 5
  givenname: Hujun
  surname: Yin
  fullname: Yin, Hujun
  email: h.yin@manchester.ac.uk
– sequence: 6
  givenname: Licheng
  surname: Jiao
  fullname: Jiao, Licheng
  email: lchjiao@mail.xidian.edu.cn
– sequence: 7
  givenname: Jianfeng
  surname: Ma
  fullname: Ma, Jianfeng
  email: ejfma@hotmail.com.cn
– sequence: 8
  givenname: Yong-Chang
  surname: Jiao
  fullname: Jiao, Yong-Chang
  email: ychjiao@xidian.edu.cn
EndPage 355
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-s1042-c4d34ded56ae6f9b9c1340d58720cfbd721a997d4fbd41a65dab7b54d3015e7c3
ISBN 9783540308195
3540308199
ISSN 0302-9743
IngestDate Tue Jul 29 19:56:37 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1042-c4d34ded56ae6f9b9c1340d58720cfbd721a997d4fbd41a65dab7b54d3015e7c3
Notes This research is supported by the European Commission funded project SEINIT (Security Expert Initiative) under reference number IST-2002-001929-SEINIT.
PageCount 8
ParticipantIDs springer_books_10_1007_11596981_52
PublicationCentury 2000
PublicationDate 2005
PublicationDateYYYYMMDD 2005-01-01
PublicationDate_xml – year: 2005
  text: 2005
PublicationDecade 2000
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesSubtitle Lecture Notes in Artificial Intelligence
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II
PublicationTitle Computational Intelligence and Security
PublicationYear 2005
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Tygar, Dough
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, CA, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, MA, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Dough
  surname: Tygar
  fullname: Tygar, Dough
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbruecken, Germany
SSID ssj0000492466
ssj0002792
ssj0000316783
Score 1.2843717
Snippet The current grid security research efforts focus on static scenarios where access depends on the identity of the subject. They do not address access control...
SourceID springer
SourceType Publisher
StartPage 348
SubjectTerms Access Control
Access Control Mechanism
Access Control Model
Malicious Node
Security Architecture
Title Dynamic Access Control for Pervasive Grid Applications
URI http://link.springer.com/10.1007/11596981_52
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwELXKVkiUQwstaqGtrIob2mq9tuP4wAFRWooAIQEVt1WScRAcFsEuleDXM2NPQvhQ1fYSZaP9SPyy48nzvDdCrGqPc4DFx1QFw6JvgsY4aF3oQ2WhLkAVlSah8N5-tn1sdk7syX230agumZZfq9tndSX_gyoeQ1xJJfsPyLZfigdwH_HFLSKM20fJ70OaNfkKxH4MDZf3s2utGcsxuTFdy_YWl7_jyv3hDeuZonX16TX5XDUF9Fw_z7fQt9StnjpKUDzc5Kp2Kkw8IC43Vr7_uDqDlMt2yT-6_DBZ3-UViv2LaSz8WmuaSDQx5QHpYB-RDg3puPYHTy7mlDTlHLYT1TSGYHyISVEtpKibkZeiTt6lHEl1MuDkSVknL98n8T6VeGBW6zOfq5HFyXjG5aYnXm5s7ez-atm2AQn-OZE6T89FQ0OJLM_ZZKOY1pvSybEKKJ68n20JsnQxLPMkBWbnl58spccM5eiNmCfViiQ5CQ7vgngRxovidTPckod7UbzqGFDiq73WtXfyVmQMuEyASwZcIuCyBVwS4LIL-Dtx_H3raHO7z301-hNFaqzKgDYQwGZFyGpf-kppMwCbu-GgqktwQ1V478DgvlFFZqEoXWnxU5g7BlfpJdEbX4zDeyEBtKqccnWNqW1pVW5q4hTAg4K8tPaD-NIMyoj-KZNRY5PdGbnlv3nTipi7vxE_it706jp8wnxwWn5msO8Aqx1XvQ
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Computational+Intelligence+and+Security&rft.au=Naqvi%2C+Syed&rft.au=Riguidel%2C+Michel&rft.atitle=Dynamic+Access+Control+for+Pervasive+Grid+Applications&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2005-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783540308195&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=348&rft.epage=355&rft_id=info:doi/10.1007%2F11596981_52
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon