Dynamic Access Control for Pervasive Grid Applications
The current grid security research efforts focus on static scenarios where access depends on the identity of the subject. They do not address access control issues for pervasive grid applications where the access privileges of a subject not only depend on their identity but also on their current con...
Saved in:
Published in | Computational Intelligence and Security pp. 348 - 355 |
---|---|
Main Authors | , |
Format | Book Chapter |
Language | English |
Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
2005
|
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 9783540308195 3540308199 |
ISSN | 0302-9743 1611-3349 |
DOI | 10.1007/11596981_52 |
Cover
Loading…
Abstract | The current grid security research efforts focus on static scenarios where access depends on the identity of the subject. They do not address access control issues for pervasive grid applications where the access privileges of a subject not only depend on their identity but also on their current context (i.e. current time, location, system resources, network state, etc). Our approach complements current authorization mechanisms by dynamically granting permission to users based on their current context. The underlying dynamic and context aware access control model extends the classic role based access control, while retaining its advantages (i.e. ability to define and manage complex security policies). The major strength of our proposed model is its ability to make access control decision dynamically according to the context information. Its dynamic property is particularly useful for pervasive grid applications. |
---|---|
AbstractList | The current grid security research efforts focus on static scenarios where access depends on the identity of the subject. They do not address access control issues for pervasive grid applications where the access privileges of a subject not only depend on their identity but also on their current context (i.e. current time, location, system resources, network state, etc). Our approach complements current authorization mechanisms by dynamically granting permission to users based on their current context. The underlying dynamic and context aware access control model extends the classic role based access control, while retaining its advantages (i.e. ability to define and manage complex security policies). The major strength of our proposed model is its ability to make access control decision dynamically according to the context information. Its dynamic property is particularly useful for pervasive grid applications. |
Author | Riguidel, Michel Naqvi, Syed |
Author_xml | – sequence: 1 givenname: Syed surname: Naqvi fullname: Naqvi, Syed email: naqvi@enst.fr organization: Computer Sciences and Networks Department, Graduate School of Telecommunications, Paris, France – sequence: 2 givenname: Michel surname: Riguidel fullname: Riguidel, Michel email: riguidel@enst.fr organization: Computer Sciences and Networks Department, Graduate School of Telecommunications, Paris, France |
BookMark | eNpNUDtPxDAYC3BI9I5O_IGuDIV8eTZjVeBAOgkGmKs0SVGgJFVyOol_T3kMeLFlyx68RqsQg0PoAvAVYCyvAbgSqoGekyO0ppxhujgNP0YFCICaUqZOUKlk85PhBhRfoWJRpFaS0TNU5vyGFzBFmBAFEjefQX94U7XGuJyrLoZ9ilM1xlQ9uXTQ2R9ctU3eVu08T97ovY8hn6PTUU_ZlX-8QS93t8_dfb173D507a7OgBmpDbOUWWe50E6MalAGKMOWN5JgMw5WEtBKScsWzUALbvUgB760MHAnDd2gy9_dPCcfXl3qhxjfcw-4_z6k_3cI_QIbFU7V |
ContentType | Book Chapter |
Copyright | Springer-Verlag Berlin Heidelberg 2005 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2005 |
DOI | 10.1007/11596981_52 |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Mathematics Computer Science |
EISBN | 3540315985 9783540315988 |
EISSN | 1611-3349 |
Editor | Yin, Hujun Ma, Jianfeng Jiao, Licheng Liu, Jiming Hao, Yue Cheung, Yiu-ming Jiao, Yong-Chang Wang, Yu-Ping |
Editor_xml | – sequence: 1 givenname: Yue surname: Hao fullname: Hao, Yue email: yhao@xidian.edu.cn – sequence: 2 givenname: Jiming surname: Liu fullname: Liu, Jiming email: jiming@comp.hkbu.edu.hk – sequence: 3 givenname: Yu-Ping surname: Wang fullname: Wang, Yu-Ping email: ywang@xidian.edu.cn – sequence: 4 givenname: Yiu-ming surname: Cheung fullname: Cheung, Yiu-ming email: ymc@comp.hkbu.edu.hk – sequence: 5 givenname: Hujun surname: Yin fullname: Yin, Hujun email: h.yin@manchester.ac.uk – sequence: 6 givenname: Licheng surname: Jiao fullname: Jiao, Licheng email: lchjiao@mail.xidian.edu.cn – sequence: 7 givenname: Jianfeng surname: Ma fullname: Ma, Jianfeng email: ejfma@hotmail.com.cn – sequence: 8 givenname: Yong-Chang surname: Jiao fullname: Jiao, Yong-Chang email: ychjiao@xidian.edu.cn |
EndPage | 355 |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-s1042-c4d34ded56ae6f9b9c1340d58720cfbd721a997d4fbd41a65dab7b54d3015e7c3 |
ISBN | 9783540308195 3540308199 |
ISSN | 0302-9743 |
IngestDate | Tue Jul 29 19:56:37 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-s1042-c4d34ded56ae6f9b9c1340d58720cfbd721a997d4fbd41a65dab7b54d3015e7c3 |
Notes | This research is supported by the European Commission funded project SEINIT (Security Expert Initiative) under reference number IST-2002-001929-SEINIT. |
PageCount | 8 |
ParticipantIDs | springer_books_10_1007_11596981_52 |
PublicationCentury | 2000 |
PublicationDate | 2005 |
PublicationDateYYYYMMDD | 2005-01-01 |
PublicationDate_xml | – year: 2005 text: 2005 |
PublicationDecade | 2000 |
PublicationPlace | Berlin, Heidelberg |
PublicationPlace_xml | – name: Berlin, Heidelberg |
PublicationSeriesSubtitle | Lecture Notes in Artificial Intelligence |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSubtitle | International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II |
PublicationTitle | Computational Intelligence and Security |
PublicationYear | 2005 |
Publisher | Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Berlin Heidelberg |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Tygar, Dough Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, CA, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, MA, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 13 givenname: Dough surname: Tygar fullname: Tygar, Dough organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbruecken, Germany |
SSID | ssj0000492466 ssj0002792 ssj0000316783 |
Score | 1.2843717 |
Snippet | The current grid security research efforts focus on static scenarios where access depends on the identity of the subject. They do not address access control... |
SourceID | springer |
SourceType | Publisher |
StartPage | 348 |
SubjectTerms | Access Control Access Control Mechanism Access Control Model Malicious Node Security Architecture |
Title | Dynamic Access Control for Pervasive Grid Applications |
URI | http://link.springer.com/10.1007/11596981_52 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwELXKVkiUQwstaqGtrIob2mq9tuP4wAFRWooAIQEVt1WScRAcFsEuleDXM2NPQvhQ1fYSZaP9SPyy48nzvDdCrGqPc4DFx1QFw6JvgsY4aF3oQ2WhLkAVlSah8N5-tn1sdk7syX230agumZZfq9tndSX_gyoeQ1xJJfsPyLZfigdwH_HFLSKM20fJ70OaNfkKxH4MDZf3s2utGcsxuTFdy_YWl7_jyv3hDeuZonX16TX5XDUF9Fw_z7fQt9StnjpKUDzc5Kp2Kkw8IC43Vr7_uDqDlMt2yT-6_DBZ3-UViv2LaSz8WmuaSDQx5QHpYB-RDg3puPYHTy7mlDTlHLYT1TSGYHyISVEtpKibkZeiTt6lHEl1MuDkSVknL98n8T6VeGBW6zOfq5HFyXjG5aYnXm5s7ez-atm2AQn-OZE6T89FQ0OJLM_ZZKOY1pvSybEKKJ68n20JsnQxLPMkBWbnl58spccM5eiNmCfViiQ5CQ7vgngRxovidTPckod7UbzqGFDiq73WtXfyVmQMuEyASwZcIuCyBVwS4LIL-Dtx_H3raHO7z301-hNFaqzKgDYQwGZFyGpf-kppMwCbu-GgqktwQ1V478DgvlFFZqEoXWnxU5g7BlfpJdEbX4zDeyEBtKqccnWNqW1pVW5q4hTAg4K8tPaD-NIMyoj-KZNRY5PdGbnlv3nTipi7vxE_it706jp8wnxwWn5msO8Aqx1XvQ |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Computational+Intelligence+and+Security&rft.au=Naqvi%2C+Syed&rft.au=Riguidel%2C+Michel&rft.atitle=Dynamic+Access+Control+for+Pervasive+Grid+Applications&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2005-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783540308195&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=348&rft.epage=355&rft_id=info:doi/10.1007%2F11596981_52 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |