A Flexible Attribute Based Access Control Method for Grid Computing

被引:62
作者
Lang, Bo [1 ,2 ]
Foster, Ian [1 ,3 ]
Siebenlist, Frank [1 ,3 ]
Ananthakrishnan, Rachana
Freeman, Tim [3 ]
机构
[1] Argonne Natl Lab, Div Math & Comp Sci, Argonne, IL 60439 USA
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing, Peoples R China
[3] Univ Chicago, Chicago, IL 60637 USA
关键词
Attribute-based access control (ABAC); Attribute-based multipolicy access control (ABMAC); Grid computing; GT4 authorization framework;
D O I
10.1007/s10723-008-9112-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Grid systems have huge and changeable user groups, and different autonomous domains always have different security policies. The attribute based access control (ABAC) model, which is flexible and scalable, is more suitable for Grid systems. This paper describes a method of building a flexible access control mechanism that is based on ABAC and supports multiple policies for Grid computing. Firstly an attribute based multipolicy access control model ABMAC is submitted. Compared with ABAC, ABMAC can describe multiple heterogeneous policies, and each policy is encapsulated without changing its descriptions. Then by extending the authorization architecture of XACML, the paper puts forward an authorization framework that supports ABMAC and is implemented in the Globus Toolkit release 4 (GT4) (Few parts of the authorization framework described in this paper can only be found in Globus Toolkit CVS repository. A more completed authorization framework will be appeared in the Globus Toolkit release 4.2). Basing on the concept of policy encapsulation, the framework provides a flexible and scalable authorization mechanism that can support multiple existing policies in a Grid system. The design and implementation details of GT4 authorization framework are also well discussed.
引用
收藏
页码:169 / 180
页数:12
相关论文
共 27 条
[1]  
Alfteri R, 2003, 1 EUR GRIDS C SANT C
[2]  
[Anonymous], 2005, P IEEE INT C WEB SER
[3]  
[Anonymous], 1973, SECURE COMPUTER SYST
[4]  
[Anonymous], 1998, INTERNET X 509 PUBLI
[5]  
BARTON T, 2006, 5 ANN PKI R D WORKSH
[6]  
Bonatti P. A., 2002, Journal of Computer Security, V10, P241
[7]  
Chadwick D., 2005, Information Security Technical Report, V10, P33, DOI 10.1016/j.istr.2004.11.004
[8]   The PERMIS X.509 role based privilege management infrastructure [J].
Chadwick, DW ;
Otenko, A .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2003, 19 (02) :277-289
[9]  
Czajkowski K., 2004, WS RESOURCE FRAMEWOR
[10]  
DAMIANI E, 2005, P 5 IEEE INT S SIGN, P18