2nd International IEEE Conference on Communication System Software and Middleware

Research Article

Towards Context Constrained Authorisation for Pervasive Grid Computing

  • @INPROCEEDINGS{10.1109/COMSWA.2007.382448,
        author={ J.S.  Chin and Zhang N. and A. Nenadic and L. Yao and J. M. Brooke},
        title={Towards Context Constrained Authorisation for Pervasive Grid Computing},
        proceedings={2nd International IEEE Conference on Communication System Software and Middleware},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2007},
        month={7},
        keywords={Access control  Adaptive control  Authorization  Collaboration  Computer architecture  Grid computing  Pervasive computing  Programmable control  Security  Virtual reality},
        doi={10.1109/COMSWA.2007.382448}
    }
    
  • J.S. Chin
    Zhang N.
    A. Nenadic
    L. Yao
    J. M. Brooke
    Year: 2007
    Towards Context Constrained Authorisation for Pervasive Grid Computing
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2007.382448
J.S. Chin1,*, Zhang N.1,*, A. Nenadic1,*, L. Yao1,*, J. M. Brooke1,*
  • 1: School of Computer Science The University of Manchester
*Contact email: jchin@cs.man.ac.uk, nzhang@cs.man.ac.uk, nenadic@cs.man.ac.uk, yaol@cs.man.ac.uk, j.m.brooke@manchester.ac.uk

Abstract

This paper describes our on-going work on the design and development of a context constrained authorisation architecture to support pervasive grid computing. It discusses security implications when bridging pervasive computing and grid computing, and analyses the limitations of current grid authorisation solutions in this pervasive grid environment. We propose some novel grid authorisation enhancements that takes into account not only users' static attributes, but also their dynamic contextual attributes inherent in pervasive computing. The design has adhered to open grid standards and specifications, and is based upon a modular layered approach so that any existing or emerging authorisation mechanisms or solutions can easily be plugged into or unplugged from the architecture. In addition, the architecture can inter-work with and be easily integrated with other grid security building blocks.