116 Hits in 7.2 sec

Progress in Multi-Disciplinary Data Life Cycle Management

C Jung, M Gasthuber, A Giesler, M Hardt, J Meyer, A Prabhune, F Rigoll, K Schwarz, A Streit
2015 Journal of Physics, Conference Series  
cycle management.  ...  respective data life cycle.  ...  The support for gridFTP is implemented via the globus authorisation callout, in which the subject of the X.509 certificate is passed via LDAP.  ... 
doi:10.1088/1742-6596/664/3/032018 fatcat:7jb3f3kg35b6zo5iy6tces2v3y


Jianying Zhou, Meng-Chow Kang, Jianying Zhou, Meng-Chow Kang
2006 Journal of Computer Security  
It contains four papers, of which three were selected from the proceedings of IWAP'05 and one is based on the keynote speech at IWAP'05.  ...  The workshop had one keynote speech and six technical sessions, covering the topics of PKI Operation & Case Study, Non-repudiation, Authorization & Access Control, Authentication & Time-Stamping, Certificate  ...  The second paper is "Life-Cycle Management of X.509 Certificates Based on LDAP Directories" by M. Lippert, V. Karatsiolis, A. Wiesmaier and J. Buchmann.  ... 
doi:10.3233/jcs-2006-14501 fatcat:ksrzlwypdngxtmozjilfpzfjhi

The Internet public key infrastructure

M. Benantar
2001 IBM Systems Journal  
The Internet public key infrastructure provides the secure digital certification required to establish a network of trust for public commerce. This paper explores the details of the infrastructure.  ...  Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations.  ...  are kept is based on the standard Lightweight Directory Access Protocol (LDAP) service.  ... 
doi:10.1147/sj.403.0648 fatcat:gr6z3mxd2bdchh5cz6ef5ptdie

SSH Key Management Challenges and Requirements

Tatu Ylonen
2019 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)  
The problem is of high practical importance, as most of our critical Internet infrastructure, cloud services, and open source software development is protected using these keys.  ...  This paper summarizes progress in SSH key management so far, highlights outstanding problems, and presents requirements for a long-term solution.  ...  OpenSSH certificates, use of X.509 certificates, something similar to how Let's encrypt handles X.509 certificates for SSL, and the ProxyCommand approach in RedHat are all potentially promising avenues  ... 
doi:10.1109/ntms.2019.8763773 dblp:conf/ntms/Ylonen19 fatcat:buf25t7qtvbfzkhn5pxc5snph4

Adapting federated cyberinfrastructure for shared data collection facilities in structural biology

Ian Stokes-Rees, Ian Levesque, Frank V. Murphy, Wei Yang, Ashley Deacon, Piotr Sliz
2012 Journal of Synchrotron Radiation  
The performance and experience with the prototype provide a model for data management at shared scientific facilities.  ...  Furthermore, the widespread use of shared scientific facilities such as synchrotron beamlines complicates the issue of data storage, access and movement, as does the increase of remote users.  ...  This work is based upon research conducted at the Advanced Photon Source on the Northeastern Collaborative Access Team beamlines, which are supported by grants from the National Center for Research Resources  ... 
doi:10.1107/s0909049512009776 pmid:22514186 pmcid:PMC3329960 fatcat:ybbb37cy7rhqpnhygqluj6cq24

Instant certificate revocation and publication using WebDAV

David W. Chadwick, Sean Antony, Rune Bjerk
2010 Journal of Computer Security  
This paper discusses these problems, and then proposes a solution based on the use of WebDAV, an enhancement to the HTTP protocol.  ...  We describe how WebDAV can be used for X.509 certificate revocation, and describe how we have implemented it in the PERMIS authorization infrastructure.  ...  The life cycle of a certificate is therefore as follows.  ... 
doi:10.3233/jcs-2009-0372 fatcat:q5oyi7uxtzbspehpf2n4dehjjy

Arc Computing Element System Administrator Guide

Farid Ould-Saada
2013 Zenodo  
The ARC Computing Element (CE) is an EMI product allowing submission and management of applications running on DCI computational resource  ...  Security on the Grid Security on the grid is achieved using X.509 certificates. Any grid service needs to have a certificate issued by a trusted Certificate Authority (CA).  ...  which users (authenticated using their X.509 certificates) can get information about the resource, submit, query and manage computing jobs with the help of client tools.  ... 
doi:10.5281/zenodo.6809 fatcat:i4u2yiuloncyvermtlzchg3yhm

A role-based infrastructure management system: design and implementation

Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin
2004 Concurrency and Computation  
One of the most significant aspects of RBAC can be viewed from its management of permissions on the basis of roles rather than individual users.  ...  The system has a role-centric view for easily managing constrained and hierarchical roles as well as assigned users and permissions. An LDAP-accessible directory service was used for a role database.  ...  Portions of this paper appeared in preliminary form in Proceedings of the 18th ACM Symposium on Applied Computing (SAC03).  ... 
doi:10.1002/cpe.807 fatcat:5c4lve33yjffrh7noogkx7d2zy

Privacy and Security Aspects on a Smart City IoT Platform

Claudio Badii, Pierfrancesco Bellini, Angelo Difino, Paolo Nesi
2019 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)  
the highest level of security/protection on their data flow.  ...  The vastness and heterogeneity of devices and the ways they are composed to offer innovative services and scenarios require a challenging vison in interoperability, security and in managing huge quantity  ...  Snap4City is an open technology and research of DISIT Lab.  ... 
doi:10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00250 dblp:conf/uic/BadiiBDN19 fatcat:azeiev3cabdsdmgy3qoxpvp5qa

The OSiRIS Project White Paper

Shawn McKee, Ben Meekhof, Ezra Kissel, Martin Swany, Andrew Keen, Michael Thompson, Matthew Lessins, Nicholas Rahme, Michael Parks
OSiRIS will provide data sharing, archiving, security and life-cycle management implemented and maintained with a single distributed service.  ...  This paper describes the design and implementation of the NSF funded OSiRIS project.  ...  Data sharing, archiving, security, and life-cycle management can all be implemented under one infrastructure.  ... 
doi:10.6084/m9.figshare.12895043.v2 fatcat:zwhtp2w6azhxjgckckejzilp7i

Towards usefully secure email

Chris Masone, Sean Smith
2007 IEEE technology & society magazine  
on real humans.  ...  trust relationships with each other, and then to use this PKI to manage their trust in people with whom they correspond via secure email.  ...  Bridge Certificate Authorities [37] provide a method of joining disparate hierarchical X.509-based PKIs in a non-hierarchical way.  ... 
doi:10.1109/mtas.2007.335563 fatcat:r5erfdulbrcolimhfuhbpjnyey

A quantitative study of Public Key Infrastructures

D Bruschi, A Curti, E Rosti
2003 Computers & security  
We focus our analysis on the performance of the subsystem in charge of generating and managing digital certificates, under a variety of load conditions, both in terms of the type of requests and their  ...  In this paper we present an evaluation study of X.509 compliant Public Key Infrastructures using queueing network models.  ...  In this paper we consider PKIs based on the X.509 certificate standard [6] .  ... 
doi:10.1016/s0167-4048(03)00113-5 fatcat:mvwtbxmm2nafdmf4bnmd4qrdsu

Identity and Access Management [chapter]

2006 Information Security Cost Management  
Abstract This thesis majorly consists of a research on Identity and Access Management. Terminology related to this topic is discussed and a formal functional definition is suggested.  ...  The grade received is not published on the document as presented in the repository.  ...  After X.500, other directory services besides LDAP also emerged.  ... 
doi:10.1201/9781420013832.ch12 fatcat:udavsowferfnlhrcjwni7artz4

Identity and Access Management [chapter]

2012 IT Audit, Control, and Security  
Abstract This thesis majorly consists of a research on Identity and Access Management. Terminology related to this topic is discussed and a formal functional definition is suggested.  ...  The grade received is not published on the document as presented in the repository.  ...  After X.500, other directory services besides LDAP also emerged.  ... 
doi:10.1002/9781118269138.ch22 fatcat:qijoculxzre4reqagzhcnwf7sq

Identity Management Frameworks for Cloud

Roshni Bhandari, Upendra Bhoi, Dhiren Patel
2013 International Journal of Computer Applications  
Cloud computing is a new trend of computing paradigm that provides a set of scalable resources on demand.  ...  An Identity Management System (IDM) supports the management of multiple digital identities for authentication and authorization.  ...  Yes Yes Protocols SAM, LDAP,XML XML based Cryptographi XRDS, JSON,HTTP RDF,X.509 WS-Trust, WS-  ... 
doi:10.5120/14501-2310 fatcat:nsuwfjnurvg67blgauu7dpva44
« Previous Showing results 1 — 15 out of 116 results