Sciweavers

517 search results - page 57 / 104
» Distributed Authentication in GRID5000
Sort
View
IDTRUST
2010
ACM
15 years 2 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
CSFW
1999
IEEE
15 years 2 months ago
Mixed Strand Spaces
Strand space analysis [13, 12] is a method for stating and proving correctness properties for cryptographic protocols. In this paper we apply the same method to the related proble...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
CCGRID
2006
IEEE
15 years 1 months ago
Building Cyberinfrastructure for Bioinformatics Using Service Oriented Architecture
-- Cyberinfrastructure makes the development and deployment of bioinformatics applications easier by providing the framework and components that may be loosely coupled using servic...
Wilfred W. Li, Sriram Krishnan, Kurt Mueller, Kohe...
GRID
2006
Springer
14 years 10 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
ICDCSW
2005
IEEE
15 years 3 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt