Title :
Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations
Author :
Haidar, Ali N. ; Abdallah, Ali E.
Author_Institution :
E-Security Res. Centre, London South Bank Univ., London
Abstract :
This paper compares and contrasts authentication mechanisms used in three VO architectures: the first reflects ad-hoc connections among several organizations, the second uses a centrally managed database and the third is based on public key infrastructure (PKI). The reason for studying these particular three architectures is that they cover a large class of currently operating VOs (i.e. supply chains, grids). These architectures used several types of authentication mechanisms starting from traditional username/password, through online trusted servers (Kerberos), to offline trusted third parties: certificate authorities and digital certificates. The current defacto-standard middleware used to build VOs, Globus toolkit, is based on the PKI architecture.
Keywords :
grid computing; organisational aspects; public key cryptography; software architecture; software tools; virtual enterprises; visual databases; Globus toolkit; Kerberos; ad-hoc connections; authentication mechanisms; centrally managed database; certificate authorities; defacto-standard middleware; digital certificates; identity management; public key infrastructure; virtual organizations; Authentication; Collaboration; Computer architecture; Conference management; Databases; Electrical equipment industry; Identity management systems; Information security; Public key; Supply chains;
Conference_Titel :
Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference on
Conference_Location :
Naples
Print_ISBN :
978-0-7695-3324-7
DOI :
10.1109/IAS.2008.67