Abstract. The characteristics of grid are outlined to point out that the traditional authorization mechanisms cannot satisfy the requirement of the grid security. Then the authorization mechanisms employed in five prevalent Grid Security Architectures are compared in terms of granularity assessment, flexibility of rights control, and achievement approach. Based on these, we propose several approaches that can enhance the authorization in grid. The strongpoint and possible problems of each approach are also put forward.
To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.