| 1 | = Security or rights management information = |
| 2 | |
| 3 | == Objective == |
| 4 | Minimal information that should be provided by the client to allow the service to known who is trying to use it to ensure '''the protection of shared resources'''. |
| 5 | |
| 6 | == Motivation == |
| 7 | |
| 8 | Scenary: Dynamic access control & secure management over federated resources. |
| 9 | * '''Resources protection:''' software (services, WFs, …) availability, computational resources (CPU, storage, …); data access restrictions |
| 10 | * '''Protection / Sharing of proprietary data''' (in a persistence system). |
| 11 | * '''Scheduling''': priority based system. |
| 12 | Security services enforce access control policies at all levels to provide secure authentication and communication over an open network. |
| 13 | |
| 14 | == State of the art == |
| 15 | * Systems: Kerberos / GAS ... |
| 16 | |
| 17 | == Discussion space == |
| 18 | Authorization levels |
| 19 | |
| 20 | Interchanging protocols (formats) |
| 21 | |
| 22 | Authentication protocols |
| 23 | |
| 24 | WFs concerns |
| 25 | |
| 26 | Profiling offer deployment (specific to the user rights) |