Show simple item record

dc.contributor.authorBAYLISS, CHRISTOPHERen_US
dc.contributor.authorSinnott, Richard O.en_US
dc.contributor.authorJie, Weien_US
dc.contributor.authorArshad, Junaiden_US
dc.date.accessioned2014-05-22T06:40:01Z
dc.date.available2014-05-22T06:40:01Z
dc.date.issued2011en_US
dc.identifier.citationBayliss, C., Sinnott, R. O., Jie, W. & Arshad, J. (2011). The design, development and application of a proxy credential auditing infrastructure for collaborative research. In 5th International MCETECH Conference on eTechnologies, Les Diablerets, Switzerland.en_US
dc.identifier.urihttp://hdl.handle.net/11343/32651
dc.descriptionThis is a pre-print of a paper from the 5th International MCETECH Conference on eTechnologies 2011 published by Springer. www.springerlink.comen_US
dc.description.abstractSingle sign-on and delegation of privileges are fundamental tenets upon which e-Infrastructures and Grid-based research more generally have been based. The realisation of single sign-on and delegation of privileges in accessing resources such as the UK e-Science National Grid Service (NGS - http://www.ngs.ac.uk) and other national facilities is typically facilitated by X.509-based Public Key Infrastructures (PKI) and exploitation of proxy certificates. This model can be categorised by authentication-oriented access and usage of resources. It is the case however that proxy certificates, can potentially be obtained and abused by a malicious third party without the knowledge of the holder. There is currently no method for end users to detect such misuse. In this paper we describe a novel proxy auditing solution that addresses this issue directly. We describe the design and implementation of this solution and illustrate its application in widely distributed and heterogeneous research environments. We focus in particular on the needs and requirements of such a facility in the ESRC funded Data Management through e- Social Science (DAMES - www.dames.org.uk) project, where secure access and monitoring of social simulations and associated data sets are required by the researchers and associated data providers.en_US
dc.languageengen_US
dc.publisherSpringeren_US
dc.relation.isversionofhttp://www.springerlink.com/content/r4760401372735v5/en_US
dc.subjectgrid computingen_US
dc.subjectgrid securityen_US
dc.subjectuser authenticationen_US
dc.subjectpublic key infrastructureen_US
dc.subjectproxy certificateen_US
dc.titleThe design, development and application of a proxy credential auditing infrastructure for collaborative researchen_US
dc.typeConference Paperen_US
melbourne.peerreviewPeer Revieweden_US
melbourne.affiliationThe University of Melbourneen_US
melbourne.affiliation.departmentEngineering - Computing and Information Systemsen_US
melbourne.publication.statusPublisheden_US
melbourne.source.title5th International MCETECH Conference on eTechnologiesen_US
melbourne.source.locationconferenceLes Diablerets, Switzerlanden_US
dc.description.sourcedateconference23-26 Januaryen_US
melbourne.publicationid170480en_US
melbourne.elementsidNA
melbourne.contributor.authorBayliss, Christopher
melbourne.contributor.authorSinnott, Richard
melbourne.accessrightsOpen Access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record