About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International IEEE Conference on Communication System Software and Middleware

Research Article

Towards Context Constrained Authorisation for Pervasive Grid Computing

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/COMSWA.2007.382448,
        author={ J.S.  Chin and Zhang N. and A. Nenadic and L. Yao and J. M. Brooke},
        title={Towards Context Constrained Authorisation for Pervasive Grid Computing},
        proceedings={2nd International IEEE Conference on Communication System Software and Middleware},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2007},
        month={7},
        keywords={Access control  Adaptive control  Authorization  Collaboration  Computer architecture  Grid computing  Pervasive computing  Programmable control  Security  Virtual reality},
        doi={10.1109/COMSWA.2007.382448}
    }
    
  • J.S. Chin
    Zhang N.
    A. Nenadic
    L. Yao
    J. M. Brooke
    Year: 2007
    Towards Context Constrained Authorisation for Pervasive Grid Computing
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2007.382448
J.S. Chin1,*, Zhang N.1,*, A. Nenadic1,*, L. Yao1,*, J. M. Brooke1,*
  • 1: School of Computer Science The University of Manchester
*Contact email: jchin@cs.man.ac.uk, nzhang@cs.man.ac.uk, nenadic@cs.man.ac.uk, yaol@cs.man.ac.uk, j.m.brooke@manchester.ac.uk

Abstract

This paper describes our on-going work on the design and development of a context constrained authorisation architecture to support pervasive grid computing. It discusses security implications when bridging pervasive computing and grid computing, and analyses the limitations of current grid authorisation solutions in this pervasive grid environment. We propose some novel grid authorisation enhancements that takes into account not only users' static attributes, but also their dynamic contextual attributes inherent in pervasive computing. The design has adhered to open grid standards and specifications, and is based upon a modular layered approach so that any existing or emerging authorisation mechanisms or solutions can easily be plugged into or unplugged from the architecture. In addition, the architecture can inter-work with and be easily integrated with other grid security building blocks.

Keywords
Access control Adaptive control Authorization Collaboration Computer architecture Grid computing Pervasive computing Programmable control Security Virtual reality
Published
2007-07-09
Publisher
IEEE
Modified
2011-07-26
http://dx.doi.org/10.1109/COMSWA.2007.382448
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL