be susceptible to. One type of such vulnerabilities
could arise from the problem of compromised certifi-
cates. Another interesting line of work is to experi-
ment with the application of the VOPS system to the
domain of Cloud computing. This will be based on
the use of XtreemOS as an operating system enabling
virtualisation platforms for Cloud service providers,
as was recently envisioned by Morin et al. in (Morin
et al., 2009). Finally, VOPS could be enhanced to
construct dynamic enforcement mechanisms capable
of enforcing runtime-based usage control policies.
ACKNOWLEDGEMENTS
This work was funded by the European FP6 project
XtreemOS under the EC contract number IST-
033576. The VOPS implementation was partially fi-
nanced by the European Union under the European
Social Fund.
REFERENCES
Arenas, A. E., Aziz, B., and Silaghi, G. C. (2008). Rep-
utation Management in Grid-based Virtual Organisa-
tions. In SECRYPT 2008, International Conference
on Security and Cryptography, pages 538–545.
Bettini, C., Jajodia, S., Wang, X., and Wijesekera, D.
(2002). Obligation Monitoring in Policy Manage-
ment. In POLICY ’02: 3rd International Workshop on
Policies for Distributed Systems and Networks. IEEE
Computer Society.
Chadwick, D. W., Zhao, G., Otenko, S., Laborde, R., Su, L.,
and Nguyen, T.-A. (2008). PERMIS: A Modular Au-
thorization Infrastructure. Concurrency and Compu-
tation: Practice and Experience, 20(11):1341–1357.
Chakrabarti, A. (2007). Grid Computing Security. Springer.
Coppola, M., J
´
egou, Y., Matthews, B., Morin, C., Prieto,
L. P., S
´
anchez, O. D., Yang, E., and Yu, H. (2008).
Virtual Organization Support within a Grid-wide Op-
erating System. IEEE Internet Computing, 12(2):20–
28.
Costa, P., Napper, J., Pierre, G., and van Steen, M. (2009).
Autonomous resource selection for decentralized util-
ity computing. In 29th International Conference on
Distributed Computing Systems (ICDCS).
Foster, I. T., Kesselman, C., and Tuecke, S. (2001). The
Anatomy of the Grid - Enabling Scalable Virtual Or-
ganizations. International Journal of High Perfor-
mance Computing Applications, 15(3):200–222.
Mazzoleni, P., Crispo, B., Sivasubramanian, S., and
Bertino, E. (2009). Efficient Integration of Fine-
Grained Access Control and Resource Brokering in
Grid. The Journal of Supercomputing, 49(1):108–126.
Morin, C., J
´
egou, Y., Gallard, J., and Riteau, P. (2009).
Clouds, A New Playground for the XtreemOS Grid
Operating System. Parallel Processing Letters (PPL),
19(3):435–449.
Nagaratnam, N., Janson, P., Dayka, J., Nadalin, A., Sieben-
list, F., Welch, V., Tuecke, S., and Foster, I. (2003).
Security Architecture for Open Grid Services. OGF
Document.
Park, J. and Sandhu, R. (2004). The UCON
abc
Usage Con-
trol Model. ACM Transactions on Information and
System Security, 7(1):128–174.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based Access Control Models.
Computer, 29(2):38–47.
Shu, C., Yang, E., and Arenas, A. (2009). Detecting
Conflicts in ABAC Policies with Rule-Reduction and
Binary-Search Techniques. In Policy 2009: IEEE
International Symposium on Policies for Distributed
Systems and Networks. IEEE Computer Society.
Turkmen, F. and Crispo, B. (2008). Performance Evalua-
tion of XACML PDP Implementations. In SWS 2008:
ACM Workshop on Secure Web Services, pages 37–44.
ACM.
Wasson, G. and Humphrey, M. (2003). Toward explicit pol-
icy management for virtual organizations. In POLICY
’03: Proceedings of the 4th IEEE International Work-
shop on Policies for Distributed Systems and Net-
works. IEEE Computer Society.
MANAGEMENT OF SECURITY POLICIES IN VIRTUAL ORGANISATIONS
477