An authorization framework for a grid based component architecture

Lavanya Ramakrishnan, Helen Rehn, Jay Alameda, Rachana Ananthakrishnan, Madhusudhan Govindaraju, Aleksander Slominski, Kay Connelly, Von Welch, Dennis Gannon, Randall Bramley, Shawn Hampton

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper1 presents an architecture to meet the needs for authentication and authorization in Grid based component systems. While Grid Security Infrastructure (GSI) [1] is accepted as the standard for authentication on the Grid, distributed authorization is still an open problem being investigated by various groups [2],[3],[4]. Our design provides authentication and fine-grained authorization at the interface, method and parameter levels. We discuss the ways in which internal and external authorization services can be used in a component framework. The design is flexible to allow the use of various existing policy languages and authorization systems. Our prototype is based on XCAT, an implementation of the Common Component Architecture (CCA) specification.

Original languageEnglish (US)
Title of host publicationGrid Computing, GRID 2002 - Third International Workshop, Proceedings
EditorsManish Parashar
PublisherSpringer
Pages169-180
Number of pages12
ISBN (Print)3540001336, 9783540001331
DOIs
StatePublished - 2002
Event3rd International Workshop on Grid Computing, GRID 2002 - Baltimore, MD, United States
Duration: Nov 18 2002Nov 18 2002

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2536 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd International Workshop on Grid Computing, GRID 2002
Country/TerritoryUnited States
CityBaltimore, MD
Period11/18/0211/18/02

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'An authorization framework for a grid based component architecture'. Together they form a unique fingerprint.

Cite this