An access control model for a grid environment employing security-as-a-service approach

被引:0
|
作者
Olatunji, E.K. [1 ]
Adigun, M.O. [1 ]
Jembere, E. [1 ]
机构
[1] Department of Computer Science, University of Zululand, Kwadlangezwa,3886, South Africa
来源
关键词
D O I
10.1007/978-3-319-06773-5_15
中图分类号
学科分类号
摘要
引用
收藏
页码:103 / 110
相关论文
共 50 条
  • [31] Design and implementation of a grid service security access platform based on GSI
    College of Computer Science, Zhejiang University, Hangzhou 310027, China
    不详
    J. Harbin Inst. Technol., 2008, SUPPL. (115-119):
  • [32] Role-based delegation access control model for virtual organization in service grid
    Research Center for Grid and Service Computing, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China
    不详
    Jisuanji Xuebao, 2006, 7 (1199-1208):
  • [33] An Attribute and Role based Access Control Model for Service-Oriented Environment
    Wei, Yonghe
    Shi, Chunjing
    Shao, Weiping
    2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 4451 - 4455
  • [34] Using Trust and Risk in Access Control for Grid Environment
    Li, Yan
    Sun, Huiping
    Chen, Zhong
    Ren, Jinqiang
    Luo, Haining
    SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 13 - +
  • [35] A security model design in Web Service environment
    Zhang, M
    Cheng, ZP
    Ma, ZJ
    Zang, BY
    FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 736 - 740
  • [36] A Service Scheduling Security Model for a Cloud Environment
    Sheikh, Abdullah
    Munro, Malcolm
    Budgen, David
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (05) : 1 - 9
  • [37] A Security Framework for Service Overlay Networks: Access Control
    Kurian, Jinu
    Sarac, Kamil
    2008 5TH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS AND SYSTEMS (BROADNETS 2008), 2008, : 412 - 419
  • [38] A web service model for climate data access on the grid
    Woolf, A
    Haines, K
    Liu, CL
    INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS, 2003, 17 (03): : 281 - 295
  • [39] Simplifying CORBA security service to support service level access control
    Kumar, A
    Jalote, P
    Gupta, D
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2003: OTM 2003 WORKSHOPS, 2003, 2889 : 793 - 806
  • [40] System security model based on trusted access control under cloud computing environment
    Wang F.
    Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242