GOLD infrastructure for virtual organizations

The paper discusses the GOLD project (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) whose principal aim is to carry out research and development into enabling technologies to support the formation, operation and termination of virtual organizations. The paper discusses the outcome of this research, which is the GOLD Middleware infrastructure. The infrastructure has been implemented in the form of a set of Middleware components, which address issues such as trust, security, contract monitoring and enforcement, information management and coordination. We discuss all these issues in turn and more importantly we demonstrate how current WS standards can be used to implement these issues. In addition, the paper follows a top down approach starting with a brief outline on the architectural elements derived during the requirements engineering phase and demonstrates how these elements were mapped onto actual services that were implemented according to service-oriented architecture principles and related technologies. Copyright © 2008 John Wiley & Sons, Ltd.

[1]  Yuri Demchenko,et al.  Virtual organisations in computer grids and identity management , 2004, Inf. Secur. Tech. Rep..

[2]  Santosh K. Shrivastava,et al.  Implementing fair non-repudiable interactions with Web services , 2005, Ninth IEEE International EDOC Enterprise Computing Conference (EDOC'05).

[3]  Gerard J. Holzmann,et al.  Design and validation of computer protocols , 1991 .

[4]  George Coulouris,et al.  Security requirements for cooperative work: a model and its system implications , 1994, EW 6.

[5]  L. Meyerovich,et al.  The Soundness and Completeness of Margrave with Respect to a Subset of XACML , 2005 .

[6]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[7]  Ravi S. Sandhu,et al.  Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management , 1997, DBSec.

[8]  Santosh K. Shrivastava,et al.  A method for specifying contract mediated interactions , 2005, Ninth IEEE International EDOC Enterprise Computing Conference (EDOC'05).

[9]  Peter Checkland,et al.  Soft Systems Methodology in Action , 1990 .

[10]  Ken Klingenstein,et al.  Federated Security: The Shibboleth Approach , 2004 .

[11]  David W. Chadwick,et al.  The PERMIS X.509 role based privilege management infrastructure , 2003, Future Gener. Comput. Syst..

[12]  Jianying Zhou,et al.  An intensive survey of fair non-repudiation protocols , 2002, Comput. Commun..

[13]  Geoffrey C. Fox,et al.  NaradaBrokering: A Distributed Middleware Framework and Architecture for Enabling Durable Peer-to-Peer Grids , 2003, Middleware.

[14]  Luc Moreau,et al.  The myGrid Notification Service , 2003 .

[15]  Rob Smith,et al.  A computer architecture to support the operation of virtual organisations for the chemical development lifecycle , 2005 .

[16]  J. Crowcroft,et al.  On the monitoring of contractual service level agreements , 2004, Proceedings. First IEEE International Workshop on Electronic Contracting, 2004..

[17]  Santosh K. Shrivastava,et al.  Contract representation for run-time monitoring and enforcement , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[18]  Michael Carl Tschantz,et al.  Verification and change-impact analysis of access-control policies , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[19]  Thomas Erl,et al.  Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services , 2004 .

[20]  Liang Chen,et al.  Grid Service Orchestration Using the Business Process Execution Language (BPEL) , 2005, Journal of Grid Computing.

[21]  Santosh K. Shrivastava,et al.  Distributed object middleware to support dependable information sharing between organisations , 2002, Proceedings International Conference on Dependable Systems and Networks.

[22]  Dieter Gollmann,et al.  On Fairness in Exchange Protocols , 2002, ICISC.

[23]  Roshan K. Thomas,et al.  Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments , 1997, RBAC '97.

[24]  Panos Periorellis Authorization-Authentication Using XACML and SAML , 2005 .

[25]  Peter Li The myGrid information model , 2004 .

[26]  Giovanni Della-Libera,et al.  Web Services Trust Language (WS-Trust) , 2002 .

[27]  Andreas Matheus,et al.  How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[28]  Santosh K. Shrivastava,et al.  Model Checking Correctness Properties of Electronic Contracts , 2003, ICSOC.