For grid computing to successfully interface with control planes and firewalls, new security techniques must be developed. Traditional network access security models either use an "outsourcing" model or an (OGSA-based) "configuration" model. The "push," or token, model, demonstrated here, works at lower network levels. In this model, an application's or user's access rights are determined by a token issued by an authority. The token is used to signal the opening of the data path. The advantage of using tokens is that a path can be pre-provisioned and an application or user holding tokens can access the network resource potentially faster then in the other models. URL:
www.science.uva.nl/research/air Contact:Leon Gommans, Advanced Internet Research Group (AIR), University of Amsterdam (UvA), NL, lgommans @ science.uva.nl Collaborators:
Leon Gommans, Cees de Laat, Bas van Oudenaarde, AIR, UvA, NL |