Bayliss, Christopher, Sinnott, Richard, Jie, Wei and Arshad, Junaid (2011) The design, development and application of a proxy credential auditing infrastructure for collaborative research. In: E-Technologies: Transformation in a Connected World. Lecture Notes in Business Information Processing (LNBIP), 78 . Springer, Heidelberg, Germany, pp. 211-226. ISBN 9783642208614Full text not available from this repository.
Single sign-on and delegation of privileges are fundamental tenets upon which e-Infrastructures and Grid-based research more generally have been based. The realisation of single sign-on and delegation of privileges in accessing resources such as the UK e-Science National Grid Service is typically facilitated by X.509-based Public Key Infrastructures (PKI) and exploitation of proxy certificates. This model can be categorised by authentication-oriented access and usage of resources. It is the case however that proxy certificates, can potentially be obtained and abused by a malicious third party without the knowledge of the holder. In this paper we describe a novel proxy auditing solution that addresses this issue directly. We describe the design and implementation of this solution and illustrate its application in widely distributed and heterogeneous research environments.
|Item Type:||Book Section|
|Uncontrolled Keywords:||grid computing, grid security, user authentication, public key infrastructure, proxy certificate|
|Depositing User:||Vani Aul|
|Date Deposited:||18 Dec 2013 12:36|
|Last Modified:||09 Mar 2017 11:50|
Actions (login required)