DocumentCode :
2855070
Title :
Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations
Author :
Haidar, Ali N. ; Abdallah, Ali E.
Author_Institution :
E-Security Res. Centre, London South Bank Univ., London
fYear :
2008
fDate :
8-10 Sept. 2008
Firstpage :
21
Lastpage :
26
Abstract :
This paper compares and contrasts authentication mechanisms used in three VO architectures: the first reflects ad-hoc connections among several organizations, the second uses a centrally managed database and the third is based on public key infrastructure (PKI). The reason for studying these particular three architectures is that they cover a large class of currently operating VOs (i.e. supply chains, grids). These architectures used several types of authentication mechanisms starting from traditional username/password, through online trusted servers (Kerberos), to offline trusted third parties: certificate authorities and digital certificates. The current defacto-standard middleware used to build VOs, Globus toolkit, is based on the PKI architecture.
Keywords :
grid computing; organisational aspects; public key cryptography; software architecture; software tools; virtual enterprises; visual databases; Globus toolkit; Kerberos; ad-hoc connections; authentication mechanisms; centrally managed database; certificate authorities; defacto-standard middleware; digital certificates; identity management; public key infrastructure; virtual organizations; Authentication; Collaboration; Computer architecture; Conference management; Databases; Electrical equipment industry; Identity management systems; Information security; Public key; Supply chains;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference on
Conference_Location :
Naples
Print_ISBN :
978-0-7695-3324-7
Type :
conf
DOI :
10.1109/IAS.2008.67
Filename :
4627055
Link To Document :
بازگشت