Computer Science – Software Engineering
Scientific paper
2010-01-27
EPTCS 16, 2010, pp. 41-50
Computer Science
Software Engineering
Scientific paper
10.4204/EPTCS.16.4
This paper attempts to accurately model security requirements for computational grid environments with particular focus on authentication. We introduce the Audited Credential Delegation (ACD) architecture as a solution to some of the virtual organisations identity management usability problems. The approach uses two complementary models: one is state based, described in Z notation, and the other is event-based, expressed in the Process Algebra of Hoare's Communicating Sequential Processes (CSP). The former will be used to capture the state of the WS and to model back-end operations on it whereas the latter will be used to model behavior, and in particular, front-end interactions and communications. The modelling helps to clearly and precisely understand functional and security requirements and provide a basis for verifying that the system meets its intended requirements.
Abdallah Ali E.
Beckles B.
Brooke John M.
Coveney Peter V.
Haidar Ali N.
No associations
LandOfFree
Formal Modelling of a Usable Identity Management Solution for Virtual Organisations does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Formal Modelling of a Usable Identity Management Solution for Virtual Organisations, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Formal Modelling of a Usable Identity Management Solution for Virtual Organisations will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-253796