Abstract | ||
---|---|---|
This paper attempts to accurately model security requirements for computational grid environments with particular focus on authentication. We introduce the Audited Credential Delegation (ACD) architecture as a solution to some of the virtual organisations (VO) identity management usability problems. The approach uses two complementary models: one is state based, described in Z notation, and the other is event-based, expressed in the Process Algebra of Hoares Communicating Sequential Processes (CSP). The former will be used to capture the state of the VO and to model "back-end" operations on it whereas the latter will be used to model behavior, and in particular, "front-end" interactions and communications. The modelling helps to clearly and precisely understand functional and security requirements and provide a basis for verifying that the system meets its intended requirements. |
Year | DOI | Venue |
---|---|---|
2009 | 10.4204/EPTCS.16.4 | ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE |
Keywords | Field | DocType |
secure computation,z notation,front end,process algebra,identity management,software engineering | Z notation,Authentication,Software engineering,Computer science,Usability,Communicating sequential processes,Identity management,Delegation,Credential,Process calculus,Distributed computing | Journal |
Volume | Issue | ISSN |
abs/1001.5 | 16 | 2075-2180 |
Citations | PageRank | References |
9 | 0.77 | 5 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ali Nasrat Haidar | 1 | 71 | 6.03 |
P. V. Coveney | 2 | 33 | 5.99 |
Ali E. Abdallah | 3 | 123 | 22.10 |
Peter Y. A. Ryan | 4 | 728 | 66.96 |
B. Beckles | 5 | 9 | 0.77 |
J. M. Brooke | 6 | 53 | 9.77 |
M. A. S. Jones | 7 | 9 | 0.77 |