-
1
-
-
20744442529
-
-
[Online]
-
National Science Foundation TeraGrid [Online]. Available: http://www.teragrid.org
-
-
-
-
3
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sep.
-
B. C. Neumann and T. Ts'o, "Kerberos: An authentication service for computer networks," IEEE Commun. Mag., vol. 32, no. 9, pp. 33-38, Sep. 1994.
-
(1994)
IEEE Commun. Mag.
, vol.32
, Issue.9
, pp. 33-38
-
-
Neumann, B.C.1
Ts'o, T.2
-
4
-
-
0034863850
-
Security implications of typical grid computing usage scenarios
-
San Francisco, CA, Aug. 7-9
-
M. Humphrey and M. Thompson, "Security implications of typical grid computing usage scenarios," in Proc. 10th Int. Symp. High Performance Distributed Computing (HPDC), San Francisco, CA, Aug. 7-9, 2001.
-
(2001)
Proc. 10th Int. Symp. High Performance Distributed Computing (HPDC)
-
-
Humphrey, M.1
Thompson, M.2
-
5
-
-
0042491747
-
Computer security
-
Aug.
-
C. Landwehr, "Computer security," Int. J. Inf. Security, vol. 1, no. 1, pp. 3-13, Aug. 2001.
-
(2001)
Int. J. Inf. Security
, vol.1
, Issue.1
, pp. 3-13
-
-
Landwehr, C.1
-
8
-
-
0003195066
-
The MD5 message-digest algorithm
-
[On-line]
-
R. Rivest. The MD5 Message-Digest Algorithm. RFC 1321. [On-line]. Available: http://www.faqs.org/rfcs/rfc1321.html
-
RFC
, vol.1321
-
-
Rivest, R.1
-
10
-
-
20744454098
-
-
(Nov.). [Online]
-
Federal Information Processing Standards Publication 197 (2001, Nov.). [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
-
(2001)
-
-
-
11
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.M.3
-
12
-
-
1442335350
-
Internet X.509 public key infrastructure time-stamp protocol (TSP)
-
(Aug). [Online]
-
C. Adams, P. Cain, D. Pinkas, and R. Zuccherato. (2001, Aug.) Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). RFC 3161. [Online]. Available: http://www.ietf.org/rfc/rfc3161.txt
-
(2001)
RFC
, vol.3161
-
-
Adams, C.1
Cain, P.2
Pinkas, D.3
Zuccherato, R.4
-
13
-
-
20744459397
-
-
[Online]
-
MIT Distribution Center for PGP (Pretty Good Privacy) [Online]. Available: http://web.mit.edu/network/pgp.html
-
-
-
-
16
-
-
0141813552
-
Internet X.509 public key infrastructure: Certificate and CRL profile
-
Apr.
-
R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 Public Key Infrastructure: Certificate and CRL Profile," RFC 3280, Apr. 2002.
-
(2002)
RFC
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
18
-
-
20744448633
-
-
[Online]
-
Shibboleth [Online]. Available: http://shibboleth.internet2.edu/
-
-
-
-
19
-
-
20744459239
-
-
[Online]
-
Passport [Online]. Available: http://www.passport.net/Consumer/Default. asp?lc=1033
-
-
-
-
20
-
-
20744437879
-
Introduction to the liberty alliance identity architecture. Revision 1.0
-
(Mar.). [Online]
-
Introduction to the Liberty Alliance Identity Architecture. Revision 1.0. Liberty Alliance Project. (2003, Mar.). [Online]. Available: http://www.projectliberty.org
-
(2003)
Liberty Alliance Project
-
-
-
21
-
-
20744454718
-
Liberty trust models guidelines. Version 1.0
-
[Online]
-
J. Linn, Ed., Liberty Trust Models Guidelines. Version 1.0. Liberty Alliance Project. [Online]. Available: http://www.projectliberty. org/specs/liberty-trust-models-guidelines-v1.0.pdf
-
Liberty Alliance Project
-
-
Linn, J.1
-
22
-
-
20744439795
-
-
[Online] or http://www.webservices.org/index.php/article/archive/61
-
Web Services [Online]. Available: http://www.w3.org/2002/ws/ or http://www.webservices.org/index.php/article/archive/61
-
-
-
-
23
-
-
34447572256
-
The TLS protocol version 1.1
-
(Mar.) [Online]
-
T. Dierks and E. Rescorla. (2004, Mar.) The TLS Protocol Version 1.1. RFC 2246. [Online]. Available: http://www.ietf.org/internet-drafts/draft-ietf-tls- rfc2246-bis-06.txt
-
(2004)
RFC
, vol.2246
-
-
Dierks, T.1
Rescorla, E.2
-
24
-
-
0004249397
-
-
Netscape Communications Corp., Nov. 18
-
A. Frier, P. Karlton, and P. Kocher, "The SSL 3.0 Protocol," Netscape Communications Corp., Nov. 18, 1996.
-
(1996)
The SSL 3.0 Protocol
-
-
Frier, A.1
Karlton, P.2
Kocher, P.3
-
25
-
-
0003358457
-
SPKI certificate theory
-
[Online]
-
C. Ellison et al.. SPKI Certificate Theory. IETF RFC 2693. [Online]. Available: http://www.ietf.org/rfc/rfc2693.txt
-
IETF RFC
, vol.2693
-
-
Ellison, C.1
-
26
-
-
0003344055
-
X.509 Internet public key infrastructure online certificate status protocol (OCSP)
-
Jun. [Online]
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, (1999, Jun.) X.509 Internet Public Key Infrastructure Online Certificate Status Protocol (OCSP). RFC 2560. [Online]. Available: http://www.ietf.org/rfc/rfc2560.txt
-
(1999)
RFC
, vol.2560
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
27
-
-
85084164300
-
Kerberized credential translation: A solution to web access control
-
Washington, D.C., Aug.
-
O. Kornievskaia, P. Honeyman, B. Doster, and K. Coffman, "Kerberized credential translation: A solution to web access control," in Proc. USENIX Security Symp., Washington, D.C., Aug. 2001.
-
(2001)
Proc. USENIX Security Symp.
-
-
Kornievskaia, O.1
Honeyman, P.2
Doster, B.3
Coffman, K.4
-
28
-
-
20744441955
-
Public key cryptography for initial authentication in kerberos
-
(Aug.) [Online]
-
B. Tung, C. Neuman, M. Hur, A. Medvinsky, S. Medvinski, J. Wray, and J. Trostle. (2004, Aug.) Public Key Cryptography for Initial Authentication in Kerberos. RFC 1510bis. [Online]. Available: http://www.ietf.org/internet-drafts/ draft-ietf-cat-kerberos-pk-init-18.txt
-
(2004)
RFC 1510bis
-
-
Tung, B.1
Neuman, C.2
Hur, M.3
Medvinsky, A.4
Medvinski, S.5
Wray, J.6
Trostle, J.7
-
31
-
-
0003068282
-
Security architecture for the internet protocol
-
(Nov.) [Online]
-
S. Kent and R. Atkinson. (1998, Nov.) Security Architecture for the Internet Protocol. RFC 2401. [Online]. Available: http://www.ietf.org/rfc/ rfc2401.txt
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
32
-
-
0032218229
-
A security architecture for computational grids
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, "A security architecture for computational grids," in Proc. 5th ACM Conf. Computer and Communications Security, 1998, pp. 83-92.
-
(1998)
Proc. 5th ACM Conf. Computer and Communications Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
33
-
-
0034502932
-
A national-scale authentication infrastructure
-
Dec.
-
R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, and V. Welch, "A national-scale authentication infrastructure," IEEE Computer, vol. 33, no. 12, pp. 60-66, Dec. 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 60-66
-
-
Butler, R.1
Engert, D.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
Volmer, J.6
Welch, V.7
-
34
-
-
0041991296
-
A flexible security system for metacomputing environments
-
Amsterdam, The Netherlands, Apr.
-
A. Ferrari, F. Knabe, M. Humphrey, S. Chapin, and A. Grimshaw, "A flexible security system for metacomputing environments," in Proc. High Performance Computing and Networking Europe, Amsterdam, The Netherlands, Apr. 1999.
-
(1999)
Proc. High Performance Computing and Networking Europe
-
-
Ferrari, A.1
Knabe, F.2
Humphrey, M.3
Chapin, S.4
Grimshaw, A.5
-
35
-
-
0032625454
-
Wide-area computing: Resource sharing on a large scale
-
May
-
A. S. Grimshaw, A. J. Ferrari, F. C. Knabe, and M. A. Humphrey, "Wide-area computing: Resource sharing on a large scale," IEEE Computer, vol. 32, no. 5, pp. 29-37, May 1999.
-
(1999)
IEEE Computer
, vol.32
, Issue.5
, pp. 29-37
-
-
Grimshaw, A.S.1
Ferrari, A.J.2
Knabe, F.C.3
Humphrey, M.A.4
-
36
-
-
0004001001
-
-
(Jun.) [Online]
-
S. Tuecke, V. Welch, D. Engert, L. Pearlman, and M. Thompson. (2004, Jun.) Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. [Online]. Available: http://www.faqs.org/ rfcs/rfc3820.html
-
(2004)
Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile
-
-
Tuecke, S.1
Welch, V.2
Engert, D.3
Pearlman, L.4
Thompson, M.5
-
37
-
-
0004063746
-
Generic security service application program interface version 2, update 1
-
(Jan.) [Online]
-
J. Linn. (2000, Jan.) Generic Security Service Application Program Interface Version 2, Update 1. RFC 2743. [Online]. Available: http:// www.ietf.org/rfc/rfc2743.txt
-
(2000)
RFC
, vol.2743
-
-
Linn, J.1
-
38
-
-
20744442687
-
-
[Online]
-
OpenSSL [Online]. Available: http://www.openssl.org
-
-
-
-
39
-
-
0003272021
-
The internet key exchange (IKE)
-
(Nov.) [Online]
-
D. Harkins and D. Carrel. (1998, Nov.) The Internet Key Exchange (IKE). RFC 2409. [Online]. Available: http://www.ietf.org/rfc/rfc2409.txt
-
(1998)
RFC
, vol.2409
-
-
Harkins, D.1
Carrel, D.2
-
40
-
-
20744457033
-
SOAP version 1.2 part 1: Messaging framework
-
[Online]
-
M. Gudgin, M. Hadley, N. Mendelsohn, J.-J. Moreau, and H. F. Nielsen. (2003, Jun.) SOAP version 1.2 part 1: Messaging framework. W3C Recommendation. [Online]. Available: http://www.w3.org/TR/soap12-part1/
-
(2003)
W3C Recommendation
-
-
Gudgin, M.1
Hadley, M.2
Mendelsohn, N.3
Moreau, J.-J.4
Nielsen, H.F.5
-
42
-
-
20744434370
-
-
[Online]
-
Open Grid Services Architecture (OGSA) Working Group [Online]. Available: https://forge.gridforum.org/projects/ogsa-wg
-
-
-
-
43
-
-
20744436324
-
-
[Online]
-
Global Grid Forum [Online]. Available: http://www.ggf.org
-
-
-
-
46
-
-
0141977707
-
XML-signature syntax and processing
-
[Online]
-
D. Eastlake, J. Reagle, and D. Solo, Eds., (2002, Feb.) XML-signature syntax and processing. W3C Recommendation. [Online]. Available: http://www.w3.org/TR/xmldsig-core/
-
(2002)
W3C Recommendation
-
-
Eastlake, D.1
Reagle, J.2
Solo, D.3
-
47
-
-
11044238224
-
XML encryption syntax and processing
-
(Dec.) [Online]
-
D. Eastlake and J. Reagle, Eds., (2002, Dec.) XML encryption syntax and processing. W3C Recommendation. [Online]. Available: http://www.w3.org/TR/ xmlenc-core/
-
(2002)
W3C Recommendation.
-
-
Eastlake, D.1
Reagle, J.2
-
48
-
-
20744443448
-
-
[Online]
-
Organization for the Advancement of Structured Information Standards (OASIS) [Online]. Available: http://www.oasis-open.org
-
-
-
-
49
-
-
21244462147
-
-
(Mar.) [Online]
-
A. Nadalin, C. Kaler, P. Hallam-Baker, and R. Monzillo, Eds., (2004, Mar.) Web Services Security: SOAP Message Security 1.0 (WS-Security 2004). [Online]. Available: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev= wss
-
(2004)
Web Services Security: SOAP Message Security 1.0 (WS-Security 2004)
-
-
Nadalin, A.1
Kaler, C.2
Hallam-Baker, P.3
Monzillo, R.4
-
52
-
-
20744447443
-
-
[Online]
-
Python OGSI Client and Implementation (pyGridWare) [Online]. Available: http://www-itg.lbl.gov/gtg/projects/pyGrid-Ware/index.html
-
-
-
-
53
-
-
4544339012
-
OGSI.NET: OGSI-compliance on the .NET framework
-
Chicago, IL, Apr. 19-22
-
G. Wasson, N. Beekwilder, M. Morgan, and M. Humphrey, "OGSI.NET: OGSI-compliance on the .NET framework," in Proc. 2004 IEEE Int. Symp. Cluster Computing and the Grid, Chicago, IL, Apr. 19-22, 2004.
-
(2004)
Proc. 2004 IEEE Int. Symp. Cluster Computing and the Grid
-
-
Wasson, G.1
Beekwilder, N.2
Morgan, M.3
Humphrey, M.4
-
54
-
-
20744445637
-
-
[Online]
-
OGSI.NET and WSRF.NET, University of Virginia. [Online]. Available: http://www.cs.virginia.edu/~humphrey/GCG/ogsi.net.ntml
-
-
-
-
55
-
-
19944421084
-
An early evaluation of WSRF and WS-notification via WSRF.NET
-
Pittsburgh, PA, Nov. 8
-
M. Humphrey, G. Wasson, M. Morgan, and N. Beekwilder, "An early evaluation of WSRF and WS-notification via WSRF.NET," in Proc. Grid Computing Workshop (Associated with Supercomputing 2004), Pittsburgh, PA, Nov. 8, 2004.
-
(2004)
Proc. Grid Computing Workshop (Associated with Supercomputing 2004)
-
-
Humphrey, M.1
Wasson, G.2
Morgan, M.3
Beekwilder, N.4
-
56
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures
-
Cambridge, U.K.: Springer LNCS, Apr.
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis, "KeyNote: Trust management for public-key infrastructures," in Proceedings of the 1998 Security Protocols International Workshop. Cambridge, U.K.: Springer LNCS, Apr. 1998, vol. 1550, pp. 59-63.
-
(1998)
Proceedings of the 1998 Security Protocols International Workshop
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
57
-
-
20744448170
-
-
[Online]
-
Grid Policy Research Group, GGF [Online]. Available: https://forge. gridforum.org/projects/policy-rg/
-
-
-
-
58
-
-
0004283436
-
-
O'Reilly, Jul.
-
H. Stem, M. Eisler, and R. Labiaga, Managing NFS and NIS, 2nd ed: O'Reilly, Jul. 2001.
-
(2001)
Managing NFS and NIS, 2nd Ed
-
-
Stem, H.1
Eisler, M.2
Labiaga, R.3
-
59
-
-
0025430451
-
Scalable, secure, and highly available distributed file access
-
20-21, May
-
M. Satyanarayanan, "Scalable, secure, and highly available distributed file access," IEEE Comput., vol. 23, no. 5, pp. 9-18, 20-21, May 1990.
-
(1990)
IEEE Comput.
, vol.23
, Issue.5
, pp. 9-18
-
-
Satyanarayanan, M.1
-
60
-
-
0003202408
-
Lightweight directory access protocol (v3)
-
(Dec.) [Online]
-
M. Wahl, T. Howes, and S. Kille. (1997, Dec.) Lightweight Directory Access Protocol (v3). RFC 2251. [Online]. Available: http://www.ietf.org/rfc/ rfc2251.txt
-
(1997)
RFC
, vol.2251
-
-
Wahl, M.1
Howes, T.2
Kille, S.3
-
61
-
-
84887853842
-
A community authorization service for group collaboration
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke, "A community authorization service for group collaboration," Proc. IEEE 3rd Int. Workshop on Policies for Distributed Systems and Networks, 2002.
-
(2002)
Proc. IEEE 3rd Int. Workshop on Policies for Distributed Systems and Networks
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
62
-
-
20744459396
-
-
[Online]
-
Virtual Organization Membership Service (VOMS) [Online]. Available: http://hep-project-grid-scg.web.cern.ch/hep-project-grid-scg/voms.html
-
-
-
-
63
-
-
85084164318
-
Certificate-based access control for widely distributed resources
-
Aug.
-
M. Thompson, W. Johnston, S. Mudumbai, G. Hoo, and K. Jackson, "Certificate-based access control for widely distributed resources," in Proc. 8th Usenix Security Symp., Aug. 1999.
-
(1999)
Proc. 8th Usenix Security Symp.
-
-
Thompson, M.1
Johnston, W.2
Mudumbai, S.3
Hoo, G.4
Jackson, K.5
-
68
-
-
33745905108
-
-
[Online]
-
Sun's XACML Implementation [Online]. Available: http://sunx-acml. sourceforge.net/
-
Sun's XACML Implementation
-
-
-
69
-
-
20744447292
-
-
[Online]
-
Global Grid Forum OGSA Authorization Working Group [Online]. Available: https://forge.gridforum.org/projects/ogsa-authz
-
-
-
-
70
-
-
20744448949
-
Agreement-based service management (WS-agreement)
-
Feb. 8
-
K. Czajkowski, A. Dan, J. Rofrano, S. Tuecke, and M. Xu, "Agreement-based service management (WS-agreement)," Global Grid Forum Draft-ggf-Graap-Agreement-1, Feb. 8, 2004.
-
(2004)
Global Grid Forum Draft-ggf-Graap-Agreement-1
-
-
Czajkowski, K.1
Dan, A.2
Rofrano, J.3
Tuecke, S.4
Xu, M.5
-
73
-
-
84888773622
-
A policy deployment model for the ponder language
-
N. Dulay, E. Lupu, M. Sloman, and N. Damianou, "A policy deployment model for the ponder language," in Proc. IEEE/IFIP Int. Symp. Integrated Network Management (IM'2001), 2001.
-
(2001)
Proc. IEEE/IFIP Int. Symp. Integrated Network Management (IM'2001)
-
-
Dulay, N.1
Lupu, E.2
Sloman, M.3
Damianou, N.4
-
74
-
-
84893077785
-
Obligation monitoring in policy management
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera, "Obligation monitoring in policy management," in Policy 2002 Workshop, 2002.
-
(2002)
Policy 2002 Workshop
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
76
-
-
33751118953
-
A policy service for GRID computing
-
D. Verma, S. Sahu, S. Calo, M. Beigi, and I. Chang, "A policy service for GRID computing," in Proc. Third Int. Workshop on Grid Computing (Grid 2002).
-
Proc. Third Int. Workshop on Grid Computing (Grid 2002)
-
-
Verma, D.1
Sahu, S.2
Calo, S.3
Beigi, M.4
Chang, I.5
-
77
-
-
84944458163
-
Policy and enforcement in virtual organizations
-
Phoenix, AZ, Nov. 17
-
G. Wasson and M. Humphrey, "Policy and enforcement in virtual organizations," in Proc. 4th Int. Workshop on Grid Computing (Grid2003) (Associated With Supercomputing 2003), Phoenix, AZ, Nov. 17, 2003.
-
(2003)
Proc. 4th Int. Workshop on Grid Computing (Grid2003) (Associated with Supercomputing 2003)
-
-
Wasson, G.1
Humphrey, M.2
-
79
-
-
0003268831
-
The COPS (common open policy service) protocol
-
(Jan.) [Online]
-
D. Durham, Ed., (2000, Jan.) The COPS (Common Open Policy Service) Protocol. RFC 2748. [Online]. Available: http://www. ietf.org/rfc/rfc2748.txt
-
(2000)
RFC
, vol.2748
-
-
Durham, D.1
-
81
-
-
20744437878
-
Grid-like architecture for application service providers
-
[Online]
-
Grid-Like Architecture for Application Service Providers, GRASP project. [Online]. Available: http://www.bitd.clrc.ac.uk/Activity/ ACTIVITY=GRASP
-
GRASP Project
-
-
-
82
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Dec. 14
-
V. Paxson, "Bro: A system for detecting network intruders in real-time," Comput. Netw., vol. 31, no. 23-24, pp. 2435-2463, Dec. 14, 1999.
-
(1999)
Comput. Netw.
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
84
-
-
20744445783
-
Security architecture for open grid services
-
Revision as of 6/5
-
N. Nagaratnam et al., "Security Architecture for Open Grid Services," Global Grid Forum Working Draft, Revision as of 6/5/2003.
-
(2003)
Global Grid Forum Working Draft
-
-
Nagaratnam, N.1
-
85
-
-
20744436618
-
OGSA security roadmap: Global grid forum specification roadmap toward a secure OGSA
-
Jul.
-
F. Siebenlist et al., "OGSA Security Roadmap: Global Grid Forum Specification Roadmap Toward a Secure OGSA," Global Grid Forum Working Draft, Jul. 2002.
-
(2002)
Global Grid Forum Working Draft
-
-
Siebenlist, F.1
|