Review of security models applied to distributed data access

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we explore the technologies behind the security models applied to distributed data access in a Grid environment. Our goal is to study a security model allowing data integrity, confidentiality, authentication and authorization for VO users. We split the process for data access in three levels: Grid authentication, Grid authorization, local enforcement. For each level, we introduce at least one possible technological solution. Finally, we show our vision of a SOA oriented security framework. This work is developed as part of the CoreGRID Network of Excellence, for the Institute on Knowledge and Data Management. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Ghiselli, A., Stagni, F., & Zappi, R. (2007). Review of security models applied to distributed data access. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4375 LNCS, pp. 34–48). Springer Verlag. https://doi.org/10.1007/978-3-540-72337-0_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free