Token-Based Network Element Access Control and Path Selection

For grid computing to successfully interface with control planes and firewalls, new security techniques must be developed. Traditional network access security models either use an "outsourcing" model or an (OGSA-based) "configuration" model. The "push," or token, model, demonstrated here, works at lower network levels. In this model, an application's or user's access rights are determined by a token issued by an authority. The token is used to signal the opening of the data path. The advantage of using tokens is that a path can be pre-provisioned and an application or user holding tokens can access the network resource potentially faster then in the other models.

URL:

www.science.uva.nl/research/air

Contact:

Leon Gommans, Advanced Internet Research Group (AIR), University of Amsterdam (UvA), NL, lgommans @ science.uva.nl

Collaborators:

Leon Gommans, Cees de Laat, Bas van Oudenaarde, AIR, UvA, NL