Print

Print


Try the security architecture people at [log in to unmask]

| Ian Neilson
| Grid Deployment Group, CERN     
                     

> -----Original Message-----
> From: LHC Computer Grid - Rollout
[mailto:[log in to unmask]]
> On Behalf Of Ian Stokes-Rees
> Sent: 10 March 2005 13:11
> To: [log in to unmask]
> Subject: [LCG-ROLLOUT] Grid identity tokens and Security Mailing lists
> 
> Hi everyone,
> 
> I have returned to security considerations for grid job scheduling and
> execution.  I am wondering if there are people on this list, people
you
> know, or mailing lists to whom I could post a few thoughts and
questions
> regarding grid security.
> 
> Specifically, I'm thinking about the use of "identity tokens".  For
> example:
> 
> Bob gives Alice a token which only Alice can use to:
> 
> access Bob's data
> generate data in Bob's "file space"
> withdraw "grid bucks" from Bob's grid bank account
> 
> and this token would have limits on it (amount of data generated,
> maximum "grid bucks", lifetime).
> 
> Anyway, I'm sure this kind of thing has done before, or has been
> considered and discarded, so I'd like to find out more about it.  If
> not, I'd like to push the idea around with other people.
> 
> Cheers,
> 
> Ian
> --
> Ian Stokes-Rees                 [log in to unmask]
> Particle Physics, Oxford
http://www-pnp.physics.ox.ac.uk/~stokes