Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Usage Control, Risk and Trust

Identifieur interne : 000C37 ( Main/Exploration ); précédent : 000C36; suivant : 000C38

Usage Control, Risk and Trust

Auteurs : Leanid Krautsevich [Italie] ; Aliaksandr Lazouski [Italie] ; Fabio Martinelli ; Paolo Mori ; Artsiom Yautsiukhin

Source :

RBID : ISTEX:3F93F8B4D4CFD32ED913DF0B68E6386B11D4552D

Abstract

Abstract: In this paper we describe our general framework for usage control (UCON) enforcement on GRID systems. It allows both GRID services level enforcement of UCON as well as fine-grained one at the level of local GRID node resources. In addition, next to the classical checks for usage control: checks of conditions, authorizations, and obligations, the framework also includes trust and risk management functionalities. Indeed, we show how trust and risk issues naturally arise when considering usage control in GRID systems and services and how our architecture is flexible enough to accommodate both notions in a pretty uniform way.

Url:
DOI: 10.1007/978-3-642-15152-1_1


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Usage Control, Risk and Trust</title>
<author>
<name sortKey="Krautsevich, Leanid" sort="Krautsevich, Leanid" uniqKey="Krautsevich L" first="Leanid" last="Krautsevich">Leanid Krautsevich</name>
</author>
<author>
<name sortKey="Lazouski, Aliaksandr" sort="Lazouski, Aliaksandr" uniqKey="Lazouski A" first="Aliaksandr" last="Lazouski">Aliaksandr Lazouski</name>
</author>
<author>
<name sortKey="Martinelli, Fabio" sort="Martinelli, Fabio" uniqKey="Martinelli F" first="Fabio" last="Martinelli">Fabio Martinelli</name>
</author>
<author>
<name sortKey="Mori, Paolo" sort="Mori, Paolo" uniqKey="Mori P" first="Paolo" last="Mori">Paolo Mori</name>
</author>
<author>
<name sortKey="Yautsiukhin, Artsiom" sort="Yautsiukhin, Artsiom" uniqKey="Yautsiukhin A" first="Artsiom" last="Yautsiukhin">Artsiom Yautsiukhin</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:3F93F8B4D4CFD32ED913DF0B68E6386B11D4552D</idno>
<date when="2010" year="2010">2010</date>
<idno type="doi">10.1007/978-3-642-15152-1_1</idno>
<idno type="url">https://api.istex.fr/document/3F93F8B4D4CFD32ED913DF0B68E6386B11D4552D/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002055</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002055</idno>
<idno type="wicri:Area/Istex/Curation">002055</idno>
<idno type="wicri:Area/Istex/Checkpoint">000457</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000457</idno>
<idno type="wicri:doubleKey">0302-9743:2010:Krautsevich L:usage:control:risk</idno>
<idno type="wicri:Area/Main/Merge">000C39</idno>
<idno type="wicri:Area/Main/Curation">000C37</idno>
<idno type="wicri:Area/Main/Exploration">000C37</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Usage Control, Risk and Trust</title>
<author>
<name sortKey="Krautsevich, Leanid" sort="Krautsevich, Leanid" uniqKey="Krautsevich L" first="Leanid" last="Krautsevich">Leanid Krautsevich</name>
<affiliation wicri:level="4">
<country>Italie</country>
<placeName>
<settlement type="city">Pise</settlement>
<region type="region" nuts="2">Toscane</region>
</placeName>
<orgName type="university">Université de Pise</orgName>
</affiliation>
<affiliation>
<wicri:noCountry code="subField">Ricerche</wicri:noCountry>
</affiliation>
</author>
<author>
<name sortKey="Lazouski, Aliaksandr" sort="Lazouski, Aliaksandr" uniqKey="Lazouski A" first="Aliaksandr" last="Lazouski">Aliaksandr Lazouski</name>
<affiliation wicri:level="4">
<country>Italie</country>
<placeName>
<settlement type="city">Pise</settlement>
<region type="region" nuts="2">Toscane</region>
</placeName>
<orgName type="university">Université de Pise</orgName>
</affiliation>
<affiliation>
<wicri:noCountry code="subField">Ricerche</wicri:noCountry>
</affiliation>
</author>
<author>
<name sortKey="Martinelli, Fabio" sort="Martinelli, Fabio" uniqKey="Martinelli F" first="Fabio" last="Martinelli">Fabio Martinelli</name>
<affiliation>
<wicri:noCountry code="subField">Ricerche</wicri:noCountry>
</affiliation>
</author>
<author>
<name sortKey="Mori, Paolo" sort="Mori, Paolo" uniqKey="Mori P" first="Paolo" last="Mori">Paolo Mori</name>
<affiliation>
<wicri:noCountry code="subField">Ricerche</wicri:noCountry>
</affiliation>
</author>
<author>
<name sortKey="Yautsiukhin, Artsiom" sort="Yautsiukhin, Artsiom" uniqKey="Yautsiukhin A" first="Artsiom" last="Yautsiukhin">Artsiom Yautsiukhin</name>
<affiliation>
<wicri:noCountry code="subField">Ricerche</wicri:noCountry>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2010</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">3F93F8B4D4CFD32ED913DF0B68E6386B11D4552D</idno>
<idno type="DOI">10.1007/978-3-642-15152-1_1</idno>
<idno type="ChapterID">1</idno>
<idno type="ChapterID">Chap1</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: In this paper we describe our general framework for usage control (UCON) enforcement on GRID systems. It allows both GRID services level enforcement of UCON as well as fine-grained one at the level of local GRID node resources. In addition, next to the classical checks for usage control: checks of conditions, authorizations, and obligations, the framework also includes trust and risk management functionalities. Indeed, we show how trust and risk issues naturally arise when considering usage control in GRID systems and services and how our architecture is flexible enough to accommodate both notions in a pretty uniform way.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Italie</li>
</country>
<region>
<li>Toscane</li>
</region>
<settlement>
<li>Pise</li>
</settlement>
<orgName>
<li>Université de Pise</li>
</orgName>
</list>
<tree>
<noCountry>
<name sortKey="Martinelli, Fabio" sort="Martinelli, Fabio" uniqKey="Martinelli F" first="Fabio" last="Martinelli">Fabio Martinelli</name>
<name sortKey="Mori, Paolo" sort="Mori, Paolo" uniqKey="Mori P" first="Paolo" last="Mori">Paolo Mori</name>
<name sortKey="Yautsiukhin, Artsiom" sort="Yautsiukhin, Artsiom" uniqKey="Yautsiukhin A" first="Artsiom" last="Yautsiukhin">Artsiom Yautsiukhin</name>
</noCountry>
<country name="Italie">
<region name="Toscane">
<name sortKey="Krautsevich, Leanid" sort="Krautsevich, Leanid" uniqKey="Krautsevich L" first="Leanid" last="Krautsevich">Leanid Krautsevich</name>
</region>
<name sortKey="Lazouski, Aliaksandr" sort="Lazouski, Aliaksandr" uniqKey="Lazouski A" first="Aliaksandr" last="Lazouski">Aliaksandr Lazouski</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000C37 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000C37 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:3F93F8B4D4CFD32ED913DF0B68E6386B11D4552D
   |texte=   Usage Control, Risk and Trust
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024