Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study

Author(s):  
Valentina Casola ◽  
Raffaele Lettiero ◽  
Massimiliano Rak ◽  
Umberto Villano
Keyword(s):  
Energies ◽  
2021 ◽  
Vol 14 (5) ◽  
pp. 1398
Author(s):  
Xinfang Wang ◽  
Rosie Day ◽  
Dan Murrant ◽  
Antonio Diego Marín ◽  
David Castrejón Botello ◽  
...  

To improve access to affordable, reliable and sustainable energy in rural areas of the global south, off-grid systems using renewable generation and energy storage are often proposed. However, solution design is often technology-driven, with insufficient consideration of social and cultural contexts. This leads to a risk of unintended consequences and inappropriate systems that do not meet local needs. To address this problem, this paper describes the application of a capabilities-led approach to understanding a community’s multi-dimensional energy poverty and assessing their needs as they see them, in order to better design suitable technological interventions. Data were collected in Tlamacazapa, Mexico, through site visits and focus groups with men and women. These revealed the ways in which constrained energy services undermined essential capabilities, including relating to health, safety, relationships and earning a living, and highlighted the specific ways in which improved energy services, such as lighting, cooking and mechanical power could improve capabilities in the specific context of Tlamacazapa. Based on these findings, we propose some potential technological interventions to address these needs. The case study offers an illustration of an assessment method that could be deployed in a variety of contexts to inform the design of appropriate technological interventions.


Author(s):  
Heitor Henrique de Paula Moraes Costa ◽  
Aleteia Patricia Favacho de Araujo ◽  
Joao Jose Costa Gondim ◽  
Maristela Terto de Holanda ◽  
Maria Emilia Machado Telles Walter

2013 ◽  
pp. 148-169
Author(s):  
Valentina Casola ◽  
Antonio Cuomo ◽  
Umberto Villano ◽  
Massimiliano Rak

Resource sharing problem is one of the most important aspects of Cloud architectures whose primary goal is to fully enable the concept of accessing computing resources on-demand. Access control and resource federation are hot research topics and a lot of open issues should be addressed on functionalities, technological interoperability, quality of services and security of the federated infrastructures. This chapter aims at offering a view on the problems of access control on federated Clouds; since they strongly depend on chosen architectures and platforms, the chapter will discuss some solutions applied on a real case study: the PerfCloud framework, which is based on the integration of Grid and Cloud platforms. The proposed architecture is based on the adoption of an interoperability system to cope with identity federation and access control, it is strictly related to the adopted framework nevertheless it helps the reader to have an idea of the involved open issues and available solutions in commercial or experimental clouds.


Author(s):  
Valentina Casola ◽  
Antonio Cuomo ◽  
Umberto Villano ◽  
Massimiliano Rak

Resource sharing problem is one of the most important aspects of Cloud architectures whose primary goal is to fully enable the concept of accessing computing resources on-demand. Access control and resource federation are hot research topics and a lot of open issues should be addressed on functionalities, technological interoperability, quality of services and security of the federated infrastructures. This chapter aims at offering a view on the problems of access control on federated Clouds; since they strongly depend on chosen architectures and platforms, the chapter will discuss some solutions applied on a real case study: the PerfCloud framework, which is based on the integration of Grid and Cloud platforms. The proposed architecture is based on the adoption of an interoperability system to cope with identity federation and access control, it is strictly related to the adopted framework nevertheless it helps the reader to have an idea of the involved open issues and available solutions in commercial or experimental clouds.


2020 ◽  
pp. 146144482095160
Author(s):  
CJ Reynolds ◽  
Blake Hallinan

Yahoo’s purchase of make-your-own-website platform GeoCities in 1999 and subsequent implementation of a new Terms of Service agreement led to one of the most notable boycotts in Web history. During the “Haunting,” GeoCities users stripped their homepages of color and content, replacing blinking GIFs with excerpts of the offending Terms of Service. In this landmark battle over content rights and access control, protestors used the platform antagonistically, disrupting the value of user-generated content and undermining the company’s strategic vision for the platform. Within a week, the Haunting of GeoCities successfully forced Yahoo to acquiesce to protestor demands and set enduring standards for Terms of Service that preserved greater rights for content creators. This case study from the early Web demonstrates how access is always bound up in a struggle over control and offers a timely reminder of how users have been—and can be—vital agents of platform politics.


Author(s):  
Saadia Kedjar ◽  
Abdelkamel Tari ◽  
Peter Bertok

With the advancement of web services technology, security has become an increasingly important issue. Various security standards have been developed to secure web services at the transport and message level, but application level has received less attention. The security solutions at the application level focus on access control which cannot alone ensure the confidentiality and integrity of information. The solution proposed in this paper consists on a hybrid model that combines access control (AC) and information flow control (IFC). The AC mechanism uses the concept of roles and attributes to control user access to web services' methods. The IFC mechanism uses labels to control how the roles access to the system's objects and verify the information flows between them to ensure the information confidentiality and integrity. This manuscript describes the model, gives the demonstration of the IFC model safety, presents the modeling and implementation of the model and a case study.


2018 ◽  
Vol 229 ◽  
pp. 1218-1232 ◽  
Author(s):  
Carlos D. Rodríguez-Gallegos ◽  
Oktoviano Gandhi ◽  
Monika Bieri ◽  
Thomas Reindl ◽  
S.K. Panda

Sign in / Sign up

Export Citation Format

Share Document