Version 3 (modified by ots, 17 years ago) |
---|
Security or rights management information
Objective
Minimal information that should be provided by the client to allow the service to known who is trying to use it to ensure the protection of shared resources.
Motivation
Scenary: Dynamic access control & secure management over federated resources.
- Resources protection: software (services, WFs, …) availability, computational resources (CPU, storage, …); data access restrictions
- Protection / Sharing of proprietary data (in a persistence system).
- Scheduling: priority based system.
Security services enforce access control policies at all levels to provide secure authentication and communication over an open network.
State of the art
- Systems: Kerberos / GAS ... Security roles graph
Discussion space
- Authorization levels
- Interchanging protocols (formats)
- Authentication protocols
- WFs concerns
- Profiling offer deployment (specific to the user rights)
Attachments
-
image002.gif
(10.6 KB) - added by ots
17 years ago.
Security graph
-
Fig-S1.JPG
(17.1 KB) - added by ots
17 years ago.
General security architecture
-
Fig-S2.JPG
(24.9 KB) - added by ots
17 years ago.
MyProxy? delegation