Try the security architecture people at [log in to unmask]
| Ian Neilson
| Grid Deployment Group, CERN
> -----Original Message-----
> From: LHC Computer Grid - Rollout
[mailto:[log in to unmask]]
> On Behalf Of Ian Stokes-Rees
> Sent: 10 March 2005 13:11
> To: [log in to unmask]
> Subject: [LCG-ROLLOUT] Grid identity tokens and Security Mailing lists
>
> Hi everyone,
>
> I have returned to security considerations for grid job scheduling and
> execution. I am wondering if there are people on this list, people
you
> know, or mailing lists to whom I could post a few thoughts and
questions
> regarding grid security.
>
> Specifically, I'm thinking about the use of "identity tokens". For
> example:
>
> Bob gives Alice a token which only Alice can use to:
>
> access Bob's data
> generate data in Bob's "file space"
> withdraw "grid bucks" from Bob's grid bank account
>
> and this token would have limits on it (amount of data generated,
> maximum "grid bucks", lifetime).
>
> Anyway, I'm sure this kind of thing has done before, or has been
> considered and discarded, so I'd like to find out more about it. If
> not, I'd like to push the idea around with other people.
>
> Cheers,
>
> Ian
> --
> Ian Stokes-Rees [log in to unmask]
> Particle Physics, Oxford
http://www-pnp.physics.ox.ac.uk/~stokes
|