A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Progress in Multi-Disciplinary Data Life Cycle Management
2015
Journal of Physics, Conference Series
cycle management. ...
respective data life cycle. ...
The support for gridFTP is implemented via the globus authorisation callout, in which the subject of the X.509 certificate is passed via LDAP. ...
doi:10.1088/1742-6596/664/3/032018
fatcat:7jb3f3kg35b6zo5iy6tces2v3y
Preface
2006
Journal of Computer Security
It contains four papers, of which three were selected from the proceedings of IWAP'05 and one is based on the keynote speech at IWAP'05. ...
The workshop had one keynote speech and six technical sessions, covering the topics of PKI Operation & Case Study, Non-repudiation, Authorization & Access Control, Authentication & Time-Stamping, Certificate ...
The second paper is "Life-Cycle Management of X.509 Certificates Based on LDAP Directories" by M. Lippert, V. Karatsiolis, A. Wiesmaier and J. Buchmann. ...
doi:10.3233/jcs-2006-14501
fatcat:ksrzlwypdngxtmozjilfpzfjhi
The Internet public key infrastructure
2001
IBM Systems Journal
The Internet public key infrastructure provides the secure digital certification required to establish a network of trust for public commerce. This paper explores the details of the infrastructure. ...
Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. ...
are kept is based on the standard Lightweight Directory Access Protocol (LDAP) service. ...
doi:10.1147/sj.403.0648
fatcat:gr6z3mxd2bdchh5cz6ef5ptdie
SSH Key Management Challenges and Requirements
2019
2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
The problem is of high practical importance, as most of our critical Internet infrastructure, cloud services, and open source software development is protected using these keys. ...
This paper summarizes progress in SSH key management so far, highlights outstanding problems, and presents requirements for a long-term solution. ...
OpenSSH certificates, use of X.509 certificates, something similar to how Let's encrypt handles X.509 certificates for SSL, and the ProxyCommand approach in RedHat are all potentially promising avenues ...
doi:10.1109/ntms.2019.8763773
dblp:conf/ntms/Ylonen19
fatcat:buf25t7qtvbfzkhn5pxc5snph4
Adapting federated cyberinfrastructure for shared data collection facilities in structural biology
2012
Journal of Synchrotron Radiation
The performance and experience with the prototype provide a model for data management at shared scientific facilities. ...
Furthermore, the widespread use of shared scientific facilities such as synchrotron beamlines complicates the issue of data storage, access and movement, as does the increase of remote users. ...
This work is based upon research conducted at the Advanced Photon Source on the Northeastern Collaborative Access Team beamlines, which are supported by grants from the National Center for Research Resources ...
doi:10.1107/s0909049512009776
pmid:22514186
pmcid:PMC3329960
fatcat:ybbb37cy7rhqpnhygqluj6cq24
Instant certificate revocation and publication using WebDAV
2010
Journal of Computer Security
This paper discusses these problems, and then proposes a solution based on the use of WebDAV, an enhancement to the HTTP protocol. ...
We describe how WebDAV can be used for X.509 certificate revocation, and describe how we have implemented it in the PERMIS authorization infrastructure. ...
The life cycle of a certificate is therefore as follows. ...
doi:10.3233/jcs-2009-0372
fatcat:q5oyi7uxtzbspehpf2n4dehjjy
Arc Computing Element System Administrator Guide
2013
Zenodo
The ARC Computing Element (CE) is an EMI product allowing submission and management of applications running on DCI computational resource ...
Security on the Grid Security on the grid is achieved using X.509 certificates. Any grid service needs to have a certificate issued by a trusted Certificate Authority (CA). ...
which users (authenticated using their X.509 certificates) can get information about the resource, submit, query and manage computing jobs with the help of client tools. ...
doi:10.5281/zenodo.6809
fatcat:i4u2yiuloncyvermtlzchg3yhm
A role-based infrastructure management system: design and implementation
2004
Concurrency and Computation
One of the most significant aspects of RBAC can be viewed from its management of permissions on the basis of roles rather than individual users. ...
The system has a role-centric view for easily managing constrained and hierarchical roles as well as assigned users and permissions. An LDAP-accessible directory service was used for a role database. ...
Portions of this paper appeared in preliminary form in Proceedings of the 18th ACM Symposium on Applied Computing (SAC03). ...
doi:10.1002/cpe.807
fatcat:5c4lve33yjffrh7noogkx7d2zy
Privacy and Security Aspects on a Smart City IoT Platform
2019
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)
the highest level of security/protection on their data flow. ...
The vastness and heterogeneity of devices and the ways they are composed to offer innovative services and scenarios require a challenging vison in interoperability, security and in managing huge quantity ...
Snap4City is an open technology and research of DISIT Lab. ...
doi:10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00250
dblp:conf/uic/BadiiBDN19
fatcat:azeiev3cabdsdmgy3qoxpvp5qa
The OSiRIS Project White Paper
2020
figshare.com
OSiRIS will provide data sharing, archiving, security and life-cycle management implemented and maintained with a single distributed service. ...
This paper describes the design and implementation of the NSF funded OSiRIS project. ...
Data sharing, archiving, security, and life-cycle management can all be implemented under one infrastructure. ...
doi:10.6084/m9.figshare.12895043.v2
fatcat:zwhtp2w6azhxjgckckejzilp7i
Towards usefully secure email
2007
IEEE technology & society magazine
on real humans. ...
trust relationships with each other, and then to use this PKI to manage their trust in people with whom they correspond via secure email. ...
Bridge Certificate Authorities [37] provide a method of joining disparate hierarchical X.509-based PKIs in a non-hierarchical way. ...
doi:10.1109/mtas.2007.335563
fatcat:r5erfdulbrcolimhfuhbpjnyey
A quantitative study of Public Key Infrastructures
2003
Computers & security
We focus our analysis on the performance of the subsystem in charge of generating and managing digital certificates, under a variety of load conditions, both in terms of the type of requests and their ...
In this paper we present an evaluation study of X.509 compliant Public Key Infrastructures using queueing network models. ...
In this paper we consider PKIs based on the X.509 certificate standard [6] . ...
doi:10.1016/s0167-4048(03)00113-5
fatcat:mvwtbxmm2nafdmf4bnmd4qrdsu
Identity and Access Management
[chapter]
2006
Information Security Cost Management
Abstract This thesis majorly consists of a research on Identity and Access Management. Terminology related to this topic is discussed and a formal functional definition is suggested. ...
The grade received is not published on the document as presented in the repository. ...
After X.500, other directory services besides LDAP also emerged. ...
doi:10.1201/9781420013832.ch12
fatcat:udavsowferfnlhrcjwni7artz4
Identity and Access Management
[chapter]
2012
IT Audit, Control, and Security
Abstract This thesis majorly consists of a research on Identity and Access Management. Terminology related to this topic is discussed and a formal functional definition is suggested. ...
The grade received is not published on the document as presented in the repository. ...
After X.500, other directory services besides LDAP also emerged. ...
doi:10.1002/9781118269138.ch22
fatcat:qijoculxzre4reqagzhcnwf7sq
Identity Management Frameworks for Cloud
2013
International Journal of Computer Applications
Cloud computing is a new trend of computing paradigm that provides a set of scalable resources on demand. ...
An Identity Management System (IDM) supports the management of multiple digital identities for authentication and authorization. ...
Yes
Yes
Protocols
SAM,
LDAP,XML
XML based
Cryptographi
XRDS,
JSON,HTTP
RDF,X.509
WS-Trust, WS- ...
doi:10.5120/14501-2310
fatcat:nsuwfjnurvg67blgauu7dpva44
« Previous
Showing results 1 — 15 out of 116 results