-
2
-
-
77955710602
-
-
See http://www.incommonfederation.org/
-
-
-
-
3
-
-
77955711795
-
-
See http://www.ukfederation.org.uk/
-
-
-
-
4
-
-
77955713885
-
-
See http://msdn2.microsoft.com/en-us/netframework/aa663320.aspx
-
-
-
-
5
-
-
33750045529
-
Federated security: The Shibboleth approach
-
R.L. Morgan, S. Cantor, S. Carmody, W. Hoehn, and K. Klingenstein Federated security: The Shibboleth approach Educause Quarterly 27 4 2004
-
(2004)
Educause Quarterly
, vol.27
, Issue.4
-
-
Morgan, R.L.1
Cantor, S.2
Carmody, S.3
Hoehn, W.4
Klingenstein, K.5
-
6
-
-
0037303408
-
The PERMIS X.509 role based privilege management infrastructure
-
David W. Chadwick, and Alexander Otenko The PERMIS X.509 role based privilege management infrastructure Future Generation Computer Systems 19 2 2003 277 289
-
(2003)
Future Generation Computer Systems
, vol.19
, Issue.2
, pp. 277-289
-
-
Chadwick, D.W.1
Otenko, A.2
-
7
-
-
56149121004
-
A concept for attribute-based authorization on D-Grid resources
-
Ralf Groeper, Christian Grimm, Siegfried Makedanz, Hans Pfeiffenberger, Wolfgang Ziegler, Peter Gietz, and Michael Schiffers A concept for attribute-based authorization on D-Grid resources Future Generation Computer Systems 25 3 2009 275 280
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.3
, pp. 275-280
-
-
Groeper, R.1
Grimm, C.2
Makedanz, S.3
Pfeiffenberger, H.4
Ziegler, W.5
Gietz, P.6
Schiffers, M.7
-
8
-
-
77955709789
-
-
NIST PKI Workshop, April 2006
-
Tom Barton, Jim Basney, Tim Freeman, Tom Scavo, Frank Siebenlist, Von Welch, Rachana Ananthakrishnan, Bill Baker, Kate Keahey, Identity federation and attribute-based authorization through the Globus Toolkit, Shibboleth, GridShib, and MyProxy. NIST PKI Workshop, April 2006
-
Identity Federation and Attribute-based Authorization Through the Globus Toolkit, Shibboleth, GridShib, and MyProxy
-
-
Barton, T.1
Basney, J.2
Freeman, T.3
Scavo, T.4
Siebenlist, F.5
Von Welch6
Ananthakrishnan, R.7
Baker, B.8
Keahey, K.9
-
9
-
-
63449096218
-
Cross domain authorization for federated virtual organizations using the myVocs collaboration environment
-
Jill Gemmill, John-Paul Robinson, Tom Scavo, and Purushotham Bangalore Cross domain authorization for federated virtual organizations using the myVocs collaboration environment Concurrency and Computation: Practice and Experience 21 4 2009 509 532
-
(2009)
Concurrency and Computation: Practice and Experience
, vol.21
, Issue.4
, pp. 509-532
-
-
Gemmill, J.1
Robinson, J.-P.2
Scavo, T.3
Bangalore, P.4
-
10
-
-
70449468800
-
Authorisation using attributes from multiple authorities-A study of requirements
-
Maastricht, The Netherlands, October 16-19, Available from
-
George Inman, David Chadwick, Nate Klingenstein, Authorisation using attributes from multiple authoritiesA study of requirements, Presented at HCSIT SummitePortfolio International Conference, Maastricht, The Netherlands, October 1619, 2007. Available from: http://sec.cs.kent.ac.uk/shintau/pages/publications. html
-
(2007)
HCSIT Summit-ePortfolio International Conference
-
-
Inman, G.1
Chadwick, D.2
Klingenstein, N.3
-
13
-
-
70349256688
-
-
C. Cahill, and J. Hodges (Eds.), v2.0, Liberty Alliance Project. Available from
-
C. Cahill, and J. Hodges (Eds.), Liberty ID-WSF discovery service specification, v2.0, Liberty Alliance Project. Available from: www.projectliberty.org/liberty/content/download/3449/22973/file/ liberty-idwsf-disco-svc-2.0-errata-v1.0.pdf
-
Liberty ID-WSF Discovery Service Specification
-
-
|