Home > Research > Publications & Outputs > On the definition of access control requirement...
View graph of relations

On the definition of access control requirements for grid and cloud computing systems

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Publication date1/12/2010
Host publicationNetworks for Grid Applications: Third International ICST Conference, GridNets 2009, Athens, Greece, September 8-9, 2009, Revised Selected Papers
EditorsAnastasios Doulamis, Joe Mambretti, Ioannis Tomkos, Theodora Varvarigou
Place of PublicationBerlin
PublisherSpringer Verlag
Pages19-26
Number of pages8
ISBN (electronic)9783642117336
ISBN (print)3642117325, 9783642117329
<mark>Original language</mark>English
Event3rd International ICST Conference on Networks for Grid Applications, GridNets 2009 - Athens, United Kingdom
Duration: 8/09/20099/09/2009

Conference

Conference3rd International ICST Conference on Networks for Grid Applications, GridNets 2009
Country/TerritoryUnited Kingdom
CityAthens
Period8/09/099/09/09

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
PublisherSpringer
Volume25
ISSN (Print)1867-8211

Conference

Conference3rd International ICST Conference on Networks for Grid Applications, GridNets 2009
Country/TerritoryUnited Kingdom
CityAthens
Period8/09/099/09/09

Abstract

The emergence of grid and cloud computing systems has introduced new security concepts, so it requires new access control approaches. Traditional systems engineering processes can be enriched with helper approaches that can facilitate the definition of access control requirements in such complex environments. Looking towards a holistic approach on the definition of access control requirements, we propose a four-layer conceptual categorization. In addition, an example is given so that to demonstrate the utilization of the proposed categorization in a grid scenario for defining access control requirements, and evaluate their fulfilment vis-à-vis contemporary employed access control approaches.