Architectural patterns for security-oriented workflows in collaborative environments

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Scientific experiments often involve use of shared resources across organization boundaries in distributed collaborative environments. They are more often enabled through web services. A plethora of research is undertaken to protect individual web services. They include centralized security models wherein the main focus is on centralised Virtual Organization (VO) specific attribute authorities, e.g. VOMS, which can be used by collaborative service providers to make authorisation decisions. And a decentralized security model wherein each service provider themselves are responsible for the assignment of roles/privileges to the different members of collaborative environments. Workflows themselves can be orchestrated in centralized or decentralized orchestration models. In this research work we have identified a number of architectural design patterns for security-enabled workflows executions. These patterns are based on the different workflows execution and security models. The key issues in such patterns as well as a rationale of choice are provided. An overview of a securityoriented workflow framework is provided that can tackle some of the issues identified in these patterns.

Cite

CITATION STYLE

APA

Hussain, S., Sinnott, R. O., & Poet, R. (2016). Architectural patterns for security-oriented workflows in collaborative environments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10066 LNCS, pp. 406–421). Springer Verlag. https://doi.org/10.1007/978-3-319-49148-6_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free