Explore chapters and articles related to this topic
A Trust-Based Access Control Management Framework for a Secure Grid Environment
Published in Yang Xiao, Security in Distributed, Grid, Mobile, and Pervasive Computing, 2007
James B. D. Joshi, Du Siqing, Saubhagya R. Joshi
The Grid Security Infrastructure (GSI), a part of the Globus project [2] has provided the basic security mechanisms for the grid including single sign-on algorithms, cross-domain authentication protocols, proxy credentials [23]. The Globus Toolkit provides a service-oriented architecture called the Open Grid Services Architecture (OGSA) that enables access to a wide range of services provided by heterogeneous systems. A key to service-oriented approach to grid security is the use of Web services technologies. WS-Security defines a standard set of Simple Object Access Protocol (SOAP) extensions, or message headers that can be used to implement integrity and confidentiality in Web services applications [1]. WS-Trust describes a framework for trust models that enables Web services to securely interoperate [23]. WS-Policy provides a general-purpose model and syntax to describe and communicate the policies of a Web service [23]. WS-Federation describes how to manage the trust relationships in a heterogeneous federated environment including support for federated identities [23]. extensible Access Control Markup Language (XACML) allows the specification of access control policies, and supports the basic RBAC model. Several access control approaches to address the security requirements of a grid have been discussed in the literature, which include Permis [7], Community Authorization Service (CAS) [26], Global Grid Forum (GGF) Authorization Framework [13, 33, 38], Privilege Management and Authorization Services (PRIMA) [7] Virtual Organization Membership Service (VOMS) from the European DataGrid project [15, 33], the JoVO [33], Shibboleth [9], Akenti [34], and others [13, 33, 38]. The Akenti system enables multiple owners and administrators to define usage policies in a widely distributed system [34]. In CAS [26], resource providers grant access to community accounts as a whole. Lorch et al. propose an authorization service to support ad hoc collaborations using attribute certificates [24]. Similarly, Ramakrishnan et al. present an authorization infrastructure for component-based grid applications by providing authorization at the component interface [27]. Sygn is another grid access control mechanism that uses certificates and supports RBAC [29].
A Multilayered Clustering Framework to build a Service Portfolio using Swarm-based algorithms
Published in Automatika, 2019
I. R. Praveen Joe, P. Varalakshmi
The following are the sources of the metadata of a web service XML Schema – For defining data types and structures.WSDL – For defining messages, message exchange patterns, interfaces and endpoints.WS-Policy – For declaring assertions for various qualities of service requirements, such as reliability, security, and transactions.WS-Addressing – For defining Web service endpoint references and associated message patterns.WS-MetadataExchange – For dynamically accessing XML, WSDL, and WS-Policy metadata when required.