Usage Control, Risk and Trust
Identifieur interne : 000C37 ( Main/Exploration ); précédent : 000C36; suivant : 000C38Usage Control, Risk and Trust
Auteurs : Leanid Krautsevich [Italie] ; Aliaksandr Lazouski [Italie] ; Fabio Martinelli ; Paolo Mori ; Artsiom YautsiukhinSource :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2010.
Abstract
Abstract: In this paper we describe our general framework for usage control (UCON) enforcement on GRID systems. It allows both GRID services level enforcement of UCON as well as fine-grained one at the level of local GRID node resources. In addition, next to the classical checks for usage control: checks of conditions, authorizations, and obligations, the framework also includes trust and risk management functionalities. Indeed, we show how trust and risk issues naturally arise when considering usage control in GRID systems and services and how our architecture is flexible enough to accommodate both notions in a pretty uniform way.
Url:
DOI: 10.1007/978-3-642-15152-1_1
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 002055
- to stream Istex, to step Curation: 002055
- to stream Istex, to step Checkpoint: 000457
- to stream Main, to step Merge: 000C39
- to stream Main, to step Curation: 000C37
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Usage Control, Risk and Trust</title>
<author><name sortKey="Krautsevich, Leanid" sort="Krautsevich, Leanid" uniqKey="Krautsevich L" first="Leanid" last="Krautsevich">Leanid Krautsevich</name>
</author>
<author><name sortKey="Lazouski, Aliaksandr" sort="Lazouski, Aliaksandr" uniqKey="Lazouski A" first="Aliaksandr" last="Lazouski">Aliaksandr Lazouski</name>
</author>
<author><name sortKey="Martinelli, Fabio" sort="Martinelli, Fabio" uniqKey="Martinelli F" first="Fabio" last="Martinelli">Fabio Martinelli</name>
</author>
<author><name sortKey="Mori, Paolo" sort="Mori, Paolo" uniqKey="Mori P" first="Paolo" last="Mori">Paolo Mori</name>
</author>
<author><name sortKey="Yautsiukhin, Artsiom" sort="Yautsiukhin, Artsiom" uniqKey="Yautsiukhin A" first="Artsiom" last="Yautsiukhin">Artsiom Yautsiukhin</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:3F93F8B4D4CFD32ED913DF0B68E6386B11D4552D</idno>
<date when="2010" year="2010">2010</date>
<idno type="doi">10.1007/978-3-642-15152-1_1</idno>
<idno type="url">https://api.istex.fr/document/3F93F8B4D4CFD32ED913DF0B68E6386B11D4552D/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002055</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002055</idno>
<idno type="wicri:Area/Istex/Curation">002055</idno>
<idno type="wicri:Area/Istex/Checkpoint">000457</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000457</idno>
<idno type="wicri:doubleKey">0302-9743:2010:Krautsevich L:usage:control:risk</idno>
<idno type="wicri:Area/Main/Merge">000C39</idno>
<idno type="wicri:Area/Main/Curation">000C37</idno>
<idno type="wicri:Area/Main/Exploration">000C37</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Usage Control, Risk and Trust</title>
<author><name sortKey="Krautsevich, Leanid" sort="Krautsevich, Leanid" uniqKey="Krautsevich L" first="Leanid" last="Krautsevich">Leanid Krautsevich</name>
<affiliation wicri:level="4"><country>Italie</country>
<placeName><settlement type="city">Pise</settlement>
<region type="region" nuts="2">Toscane</region>
</placeName>
<orgName type="university">Université de Pise</orgName>
</affiliation>
<affiliation><wicri:noCountry code="subField">Ricerche</wicri:noCountry>
</affiliation>
</author>
<author><name sortKey="Lazouski, Aliaksandr" sort="Lazouski, Aliaksandr" uniqKey="Lazouski A" first="Aliaksandr" last="Lazouski">Aliaksandr Lazouski</name>
<affiliation wicri:level="4"><country>Italie</country>
<placeName><settlement type="city">Pise</settlement>
<region type="region" nuts="2">Toscane</region>
</placeName>
<orgName type="university">Université de Pise</orgName>
</affiliation>
<affiliation><wicri:noCountry code="subField">Ricerche</wicri:noCountry>
</affiliation>
</author>
<author><name sortKey="Martinelli, Fabio" sort="Martinelli, Fabio" uniqKey="Martinelli F" first="Fabio" last="Martinelli">Fabio Martinelli</name>
<affiliation><wicri:noCountry code="subField">Ricerche</wicri:noCountry>
</affiliation>
</author>
<author><name sortKey="Mori, Paolo" sort="Mori, Paolo" uniqKey="Mori P" first="Paolo" last="Mori">Paolo Mori</name>
<affiliation><wicri:noCountry code="subField">Ricerche</wicri:noCountry>
</affiliation>
</author>
<author><name sortKey="Yautsiukhin, Artsiom" sort="Yautsiukhin, Artsiom" uniqKey="Yautsiukhin A" first="Artsiom" last="Yautsiukhin">Artsiom Yautsiukhin</name>
<affiliation><wicri:noCountry code="subField">Ricerche</wicri:noCountry>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2010</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">3F93F8B4D4CFD32ED913DF0B68E6386B11D4552D</idno>
<idno type="DOI">10.1007/978-3-642-15152-1_1</idno>
<idno type="ChapterID">1</idno>
<idno type="ChapterID">Chap1</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: In this paper we describe our general framework for usage control (UCON) enforcement on GRID systems. It allows both GRID services level enforcement of UCON as well as fine-grained one at the level of local GRID node resources. In addition, next to the classical checks for usage control: checks of conditions, authorizations, and obligations, the framework also includes trust and risk management functionalities. Indeed, we show how trust and risk issues naturally arise when considering usage control in GRID systems and services and how our architecture is flexible enough to accommodate both notions in a pretty uniform way.</div>
</front>
</TEI>
<affiliations><list><country><li>Italie</li>
</country>
<region><li>Toscane</li>
</region>
<settlement><li>Pise</li>
</settlement>
<orgName><li>Université de Pise</li>
</orgName>
</list>
<tree><noCountry><name sortKey="Martinelli, Fabio" sort="Martinelli, Fabio" uniqKey="Martinelli F" first="Fabio" last="Martinelli">Fabio Martinelli</name>
<name sortKey="Mori, Paolo" sort="Mori, Paolo" uniqKey="Mori P" first="Paolo" last="Mori">Paolo Mori</name>
<name sortKey="Yautsiukhin, Artsiom" sort="Yautsiukhin, Artsiom" uniqKey="Yautsiukhin A" first="Artsiom" last="Yautsiukhin">Artsiom Yautsiukhin</name>
</noCountry>
<country name="Italie"><region name="Toscane"><name sortKey="Krautsevich, Leanid" sort="Krautsevich, Leanid" uniqKey="Krautsevich L" first="Leanid" last="Krautsevich">Leanid Krautsevich</name>
</region>
<name sortKey="Lazouski, Aliaksandr" sort="Lazouski, Aliaksandr" uniqKey="Lazouski A" first="Aliaksandr" last="Lazouski">Aliaksandr Lazouski</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000C37 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000C37 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= TelematiV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:3F93F8B4D4CFD32ED913DF0B68E6386B11D4552D |texte= Usage Control, Risk and Trust }}
This area was generated with Dilib version V0.6.31. |