期刊论文详细信息
Journal of Computer Science
A Stringent Authorization using Principles and Policy for Grid Computing | Science Publications
A. R. Jayasudha1  T. Purusothaman1 
关键词: Public key;    authentication technology;    underlying authentication;    policy file;    web services;    preferred customers;    authorization decision;    login module;    decision point;    traditional authorization;    authorization service;    login module;   
DOI  :  10.3844/jcssp.2011.1295.1301
学科分类:计算机科学(综合)
来源: Science Publications
PDF
【 摘 要 】

Problem statement: The current information security mechanisms are insufficient to address authorization issues. The access control models today are mostly static and they are not wellsuited for the service-oriented environments where information access is dynamic in nature. Traditional authorization security techniques do not directly address these concerns as they primarily use access control lists for authorization, where the user whose name appears in the list is authorized to access the grid with some privileges associated with the names, which requires the resource provider to maintain authorization decisions for every user, which is very time consuming and non-scalable solution. Approach: Organizations pass user roles instead of name and date of birth but it used Public Key Infrastructure user certificate for authorization which is inflexible when it comes to open distributed systems (Grid) as it assumes a pre-agreed trust between Service Provider and the Service consumer. Usage of Java authentication and authorization services is performed in a pluggable fashion. It permits the application to remain independent from underlying authentication technology. Results: Our implementation provides service providers with full control over authentication and authorization of accounts that access services. Implementation of the proposed technique has proved to be less time consuming and more secured for authentication and authorization as compared to the traditional way of authenticating the users. The Policy Decision Service is envisioned to be used by many Web services protected by their PEPs. Conclusion: The model brings out many advantages over traditional identity. It is more flexible and more powerful and is suited for dynamic environments for Web services.

【 授权许可】

Unknown   

【 预 览 】
附件列表
Files Size Format View
RO201911300355609ZK.pdf 121KB PDF download
  文献评价指标  
  下载次数:8次 浏览次数:1次