Differences between revisions 70 and 81 (spanning 11 versions)
Revision 70 as of 2006-05-23 15:04:35
Size: 22331
Editor: MarkNorman
Comment:
Revision 81 as of 2006-05-24 14:43:58
Size: 22882
Editor: AlunEdwards
Comment:
Deletions are marked like this. Additions are marked like this.
Line 2: Line 2:
 * the pages of project notes in particular need to be "moth-balled" properly
  * AE will attend to this after Evaluation pages are signed off.
 * '''At least one action for Mark''' included – e.g. recording where n. '''MUST''' be in the report etc.
Line 16: Line 13:
 * [[Anchor(NagaratnamSOGS)]]'''The Security for Open Grid Services''' July 17 2002, Version 1. Nataraj Nagaratnam (IBM Corporation), Phillipe Janson (IBM Corporation), John Dayka (IBM Corporation), Anthony Nadalin (IBM Corporation), Frank Siebenlist (Argonne National Laboratory), Von Welch (University of Chicago), Ian Foster (Arg onne National Laboratory and University of Chicago), Steve Tuecke (Argonne National Laboratory)  * [[Anchor(NagaratnamSOGS)]]'''The Security for Open Grid Services''' July 17 2002, Version 1. Nataraj Nagaratnam (IBM Corporation), Phillipe Janson (IBM Corporation), John Dayka (IBM Corporation), Anthony Nadalin (IBM Corporation), Frank Siebenlist (Argonne National Laboratory), Von Welch (University of Chicago), Ian Foster (Argonne National Laboratory and University of Chicago), Steve Tuecke (Argonne National Laboratory)
  * For project notes about this see UsecasesNagaratnam
Line 19: Line 17:
{{{
xxxx action for final report then please delete this note:: this has the 2 routes, “must use in report”. Large document with lots of use cases. Use this to bolster our set of use cases. ''N.B. Google for this as there may be different versions of this around the place.''
}}}
  * For project notes about this see UsecasesFoster
Line 41: Line 37:
  * For project notes about this see UsecasesHumanities
Line 43: Line 40:
  * For project notes about this see UsecasesGridshib
Line 45: Line 43:
  * For project notes about this see UsecasesAdvancedreservation
Line 49: Line 48:
  * For project notes about this see UsecaseseBusinessgrid
Line 89: Line 89:

 * Cockburn, Alistair, "Structuring Use Cases with Goals", Journal of Object-Oriented Programming, Sep-Oct, 1997 and Nov-Dec, 1997. Also available on http://alistair.cockburn.us/crystal/articles/sucwg/structuringucswithgoals.htm

 * Malan, R. and D. Bredemeyer, "Functional Requirements and Use Cases", June 1999. http://www.bredemeyer.com/pdf_files/functreq.pdf

 * Malan, R. and D. Bredemeyer, "Use Case Action Guide", April 2000. http://www.bredemeyer.com/pdf_files/UseCase_Template.PDF

 * Larmen, Craig, "Use-case model: writing requirements in context" from Applying UML and Patterns—An Intro to OOA/D and Iterative Development 2005 http://www.craiglarman.com/book_applying_2nd/06-use%20cases.pdf
Line 136: Line 144:
 * '''Use of SAML for OGSA Authorization'''. Von Welch, NCSA Rachana Ananthakrishnan, Argonne National Laboratory Frank Siebenlist, Argonne National Laboratory David Chadwick, University of Salford Sam Meder, University of Chicago Laura Pearlman, Information Sciences Institute. February 15, 2003.
http://www.cs.virginia.edu/~humphrey/ogsa-sec-wg/OGSA%20SAML%20Authorization%20Assertions-Feb15.pdf
 * '''Use of SAML for OGSA Authorization'''. Von Welch, NCSA Rachana Ananthakrishnan, Argonne National Laboratory Frank Siebenlist, Argonne National Laboratory David Chadwick, University of Salford Sam Meder, University of Chicago Laura Pearlman, Information Sciences Institute. February 15, 2003. http://www.cs.virginia.edu/~humphrey/ogsa-sec-wg/OGSA%20SAML%20Authorization%20Assertions-Feb15.pdf
Line 141: Line 148:
 * '''OCSP Requirements for Grids''' GFD-C Category: Community Practice Documents CA Operations WG http://www-unix.gridforum.org/mail_archive/caops-wg/2004/09/pdf00000.pdf Ivo:  * '''OCSP Requirements for Grids''' GFD-C Category: Community Practice Documents CA Operations WG http://www-unix.gridforum.org/mail_archive/caops-wg/2004/09/pdf00000.pdf
Line 148: Line 155:
 * '''Security Implications of Typical Grid Computing Usage Scenarios'''. GFD-I.12 Security Working Grou, Marty Humphrey University of Virginia Mary Thompson Lawrence Berkeley National Laboratory October 2000 http://www.globalgridforum.org/documents/GFD/GFD-I.12.pdf  * '''Security Implications of Typical Grid Computing Usage Scenarios'''. GFD-I.12 Security Working Group, Marty Humphrey University of Virginia Mary Thompson Lawrence Berkeley National Laboratory October 2000 http://www.globalgridforum.org/documents/GFD/GFD-I.12.pdf
Line 153: Line 160:
  * For Project notes see UsecasesWelch
Line 165: Line 173:
 * [[Anchor(Beckles)]]'''Removing digital certificates from the end-user s experience of grid environments'''. Bruce Beckles University of Cambridge Computing Service. UK: Proceedings of the UK e-Science All Hands Meeting 2004. http://www.allhands.org.uk/2004/proceedings/papers/250.pdf  * [[Anchor(Beckles)]]'''Removing digital certificates from the end-users experience of grid environments'''. Bruce Beckles University of Cambridge Computing Service. UK: Proceedings of the UK e-Science All Hands Meeting 2004. http://www.allhands.org.uk/2004/proceedings/papers/250.pdf

xxxx Final edits needed on (and just off) this page

Citations for all the articles used:


Security – grid use-cases


Security - definitions – e.g. what is a grid?


Security – grids