By Topic

Towards Context Constrained Authorisation for Pervasive Grid Computing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Chin, J.S. ; Sch. of Comput. Sci., Manchester Univ., Manchester, UK ; Zhang, N. ; Nenadic, A. ; Yao, L.
more authors

This paper describes our on-going work on the design and development of a context constrained authorisation architecture to support pervasive grid computing. It discusses security implications when bridging pervasive computing and grid computing, and analyses the limitations of current grid authorisation solutions in this pervasive grid environment. We propose some novel grid authorisation enhancements that takes into account not only users' static attributes, but also their dynamic contextual attributes inherent in pervasive computing. The design has adhered to open grid standards and specifications, and is based upon a modular layered approach so that any existing or emerging authorisation mechanisms or solutions can easily be plugged into or unplugged from the architecture. In addition, the architecture can inter-work with and be easily integrated with other grid security building blocks.

Published in:

Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on

Date of Conference:

7-12 Jan. 2007