Abstract
In this paper, we explore the technologies behind the security models applied to distributed data access in a Grid environment. Our goal is to study a security model allowing data integrity, confidentiality, authentication and authorization for VO users. We split the process for data access in three levels: Grid authentication, Grid authorization, local enforcement. For each level, we introduce at least one possible technological solution. Finally, we show our vision of a SOA oriented security framework. This work is developed as part of the CoreGRID Network of Excellence, for the Institute on Knowledge and Data Management. © Springer-Verlag Berlin Heidelberg 2007.
Author supplied keywords
Cite
CITATION STYLE
Ghiselli, A., Stagni, F., & Zappi, R. (2007). Review of security models applied to distributed data access. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4375 LNCS, pp. 34–48). Springer Verlag. https://doi.org/10.1007/978-3-540-72337-0_5
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.