shared common space between the different
partners.
On the way to dynamically create virtual
organizations we needed an access control model
that takes into consideration the grid environment
constraints as inter-domain aspect, large scale,
dynamic resource allocation…. We presented
OrBAC as the candidate having too many features
appropriate for this mission. OrBAC models a multi-
administered environment using the “role view
activity” abstraction which abides to the Grid
constraints (large scale and dynamic resources).
However, since the dynamic resources allocation
can be propagated on multiple sites on behalf of the
user, the model should realize delegation aspects
(Welch, 2004). Delegation will be discussed in
details in another paper. After completing the model
an analysis is needed to study the appropriate way
for implementing OrBAC within the different Grid
layers (Foster, 2001).
REFERENCES
Alfieri R., Cecchini R., Ciaschini V., dell’Agnello L.,
Frohner A., Gianoli A., L˝orentey K., and Spataro F.
(2003). VOMS, an authorizatuin system for virtual
organizations. Presented at 1st European Across Grids
Conference, Santiago de Compostela, February 13-14,
2003.
http://grid-auth.infn.it/docs/VOMS-Santiago.pdf
Abou El Kalam A., El Baida R., Balbiani P., Benferhat S.,
Cuppens F., Deswartes Y., Miege A., Saurel C.,
Trouessin G. (2003). “Organization Based Access
Control”. In Proceedings
of the 4th IEEE
International Workshop on Policies for Distributed
Systems and Networks (Policy'03), p.120-131, June 4-
6, 2003, Lake Como, Italy.
Cannon S., Chan S., Olson D., Tull C., Welch V.,
Pearlman L. (2003). Using CAS to manage Role based
VO sub-groups. In CHEP 2003. La Jolla, California.
Baru C., Moore R., Rajasekar A., Wan M. (1998). The
SDSC Storage Resource Broker. In Proc. CASCON'98
Conference, Nov.30-Dec.3, 1998, Toronto, Canada.
http://www.npaci.edu/DICE/Pubs/CSI-paper-sent.doc
Djordjevic I., Dimitrakos T., Phillips C. (2004). An
Architecture for Dynamic Security Perimeters of
Virtual Collaborative Networks. In Proceeding 9th
IEEE/IFIP Network Operations and Management
Symposium, (NOMS 2004), April 2004. IEEE-CS.
Cuppens F., Miege A. (2003). Ad-OrBAC: An
Administration Model for Or-BAC. Workshop on
Metadata for Security, International Federated
Conferences (OTM'03), Catania, Sicily, Italy,
November 3-7, 2003.
Foster I., Kesselman C., Tuecke S. (2001). The Anatomy
of the Grid: Enabling Scalable Virtual Organizations.
In, International J. Supercomputer
Applications,15(3),2001.
Foster I., Kesselman C., (1997). A Metacomputing
Infrastructure Toolkit. Intl J. Supercomputer
Applications, 11(2):115-128.
Fedak G., Germain C., Neri V., and Cappello F. (2001).
XtremWeb: A Generic Global Computing System.
CCGRID2001, workshop on Global Computing on
Personal Devices, May 2001, IEEE Press.
Karl Czajkowski, Ian Foster, Carl Kesselman, Volker
Sander, Steven Tuecke, (2002). SNAP: A Protocol for
Negotiation of Service Level Agreements and
Coordinated Resource Management in Distributed
Systems. Draft submission to JSSPP’02 April 30,
2002. Retrieved January 26, 2005 from:
http://www-unix.mcs.anl.gov/~schopf/ggf-
sched/GGF5/sched-GRAAP.3.pdf
Nitin Nayak, Tian Chao, Jenny Li, Joris Mihaeli, Raja
Das, Annap Derebail, Jeff Soo Hoo, (2001). Role of
Technology in Enabling Dynamic Virtual Enterprises.
Retrieved January 26, 2005 from:
http://cersi.luiss.it/oesseo2001/papers/13.pdf
Samarati P., De Capitani di Vimercati S.. Access Control:
Policies, Models, and Mechanisms. Retrieved January
26, 2005 from:
http://www.ic.unicamp.br/~rdahab/cursos/inf712/mate
rial_didatico/docs/LNCS2171_Cap3.pdf
Russell D., Dew P., Djemame K (2004). Access control
for dynamic virtual organizations. In Proceedings of
the UK e-Science All Hands Meeting 2004, © EPSRC
Sept 2004. Retrieved January 26, 2005 from:
http://www.allhands.org.uk/2004/proceedings/proceed
ings/proceedings.pdf
Sandhu R., Coyne E., Feinstein H., Youman C. (1996).
Role-Based Access Control Models. IEEE Computer,
vol. 29, n° 2, pp.38-47, février, 1996.
Sandhu R., Munawer Q. (1999). The ARBAC99 Model
for Administration of Roles. In Proceeding of the 15th
Annual Computer Security Applications Conference
(ACSAC’99), Phoenix, Arizona, 6-10 December 1999,
IEEE Computer Society, pp. 229-241.
Welch V., Foster, I., Kesselman, C., Mulmo, O.,
Pearlman, L., Tuecke, S., Gawor, J., Meder, S. and
Siebenlist, F. (2004). X.509 proxy certificate for
dynamic delegation. Proceedings of the 3rd Annual
PKI R&D Workshop.
Wedde H.F., Lischka M., (2003).Cooperative Role-Based
Administration. Proceedings of the eighth ACM
symposium on Access control models and technologies
Como, Italy 2003
ICEIS 2005 - INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION
158