메뉴 건너뛰기




Volumn 6633 LNCS, Issue , 2011, Pages 38-53

Role-based secure inter-operation and resource usage management in mobile grid systems

Author keywords

cross domain authorization; mobile Grid; resource usage management; role based access control (RBAC); secure inter operation

Indexed keywords

CROSS-DOMAIN; MOBILE GRID; RESOURCE USAGE; ROLE-BASED ACCESS CONTROL; SECURE INTER-OPERATION; SECURE INTEROPERATION;

EID: 79958784381     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21040-2_3     Document Type: Conference Paper
Times cited : (3)

References (28)
  • 1
    • 35048883832 scopus 로고    scopus 로고
    • VOMS, an authorization system for virtual organizations
    • Fernández Rivera, F., Bubak, M., Gómez Tato, A., Doallo, R. (eds.) Across Grids 2003. Springer, Heidelberg
    • Alfieri, R., Cecchini, R.L., Ciaschini, V., dell'Agnello, L., Frohner, A., Gianoli, A., Lõrentey, K., Spataro, F.: VOMS, an authorization system for virtual organizations. In: Fernández Rivera, F., Bubak, M., Gómez Tato, A., Doallo, R. (eds.) Across Grids 2003. LNCS, vol. 2970, pp. 33-40. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2970 , pp. 33-40
    • Alfieri, R.1    Cecchini, R.L.2    Ciaschini, V.3    Dell'Agnello, L.4    Frohner, A.5    Gianoli, A.6    Lõrentey, K.7    Spataro, F.8
  • 5
    • 0037362986 scopus 로고    scopus 로고
    • Role-based access control with x. 509 attribute certificates
    • Chadwick, D., Otenko, A., Ball, E.: Role-based access control with x. 509 attribute certificates. IEEE Internet Computing 7(2), 62-69 (2003)
    • (2003) IEEE Internet Computing , vol.7 , Issue.2 , pp. 62-69
    • Chadwick, D.1    Otenko, A.2    Ball, E.3
  • 10
    • 0010032891 scopus 로고    scopus 로고
    • Computational issues in secure interoperation
    • Gong, L., Qian, X.: Computational issues in secure interoperation. IEEE Trans. Softw. Eng. 22(1), 43-52 (1996)
    • (1996) IEEE Trans. Softw. Eng. , vol.22 , Issue.1 , pp. 43-52
    • Gong, L.1    Qian, X.2
  • 11
    • 79551535025 scopus 로고    scopus 로고
    • On the definition of access control requirements for grid and cloud computing systems
    • Doulamis, A., Mambretti, J., Tomkos, I., Varvarigou, T. (eds.) GridNets 2009. Springer, Heidelberg
    • Gouglidis, A., Mavridis, I.: On the definition of access control requirements for grid and cloud computing systems. In: Doulamis, A., Mambretti, J., Tomkos, I., Varvarigou, T. (eds.) GridNets 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 25, pp. 19-26. Springer, Heidelberg (2010)
    • (2010) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , vol.25 , pp. 19-26
    • Gouglidis, A.1    Mavridis, I.2
  • 15
    • 3142523603 scopus 로고    scopus 로고
    • The ucon abc usage control model
    • Park, J., Sandhu, R.: The ucon abc usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128-174 (2004)
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 19
    • 35248873795 scopus 로고    scopus 로고
    • Usage control: A vision for next generation access control
    • Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. Springer, Heidelberg
    • Sandhu, R., Park, J.: Usage control: A vision for next generation access control. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 17-31. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2776 , pp. 17-31
    • Sandhu, R.1    Park, J.2
  • 21
    • 28244460211 scopus 로고    scopus 로고
    • Secure interoperation in a multidomain environment employing rbac policies
    • Shafiq, B., Joshi, J.B.D., Bertino, E., Ghafoor, A.: Secure interoperation in a multidomain environment employing rbac policies. IEEE Trans. on Knowl. and Data Eng. 17(11), 1557-1577 (2005)
    • (2005) IEEE Trans. on Knowl. and Data Eng. , vol.17 , Issue.11 , pp. 1557-1577
    • Shafiq, B.1    Joshi, J.B.D.2    Bertino, E.3    Ghafoor, A.4
  • 24
    • 24344501341 scopus 로고    scopus 로고
    • Access control in collaborative systems
    • Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29-41 (2005)
    • (2005) ACM Comput. Surv. , vol.37 , Issue.1 , pp. 29-41
    • Tolone, W.1    Ahn, G.J.2    Pai, T.3    Hong, S.P.4
  • 28
    • 38949184514 scopus 로고    scopus 로고
    • Toward a usage-based security framework for collaborative computing systems
    • Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur. 11(1), 1-36 (2008)
    • (2008) ACM Trans. Inf. Syst. Secur. , vol.11 , Issue.1 , pp. 1-36
    • Zhang, X.1    Nakae, M.2    Covington, M.J.3    Sandhu, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.