×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [proxy certificates]
Email Best Practices
1.499 views
It’s not about security... it’s about access! Grid Security Pieter van Beek
266 views
Identity-Based Cryptography for Grid Security Hoon Wei Lim Information Security Group Royal Holloway, University of London (Joint work with Kenny Paterson)
220 views
5-1.1 Grid Security © 2011 B. Wilkinson/Clayton Ferner. Fall 2011 Grid computing course. Modification date: July 15, 2011
213 views
New Capabilities in QosCosGrid Middleware for Advanced Job Management, Advance Reservation and Co-allocation of Computing Resources B. Bosak, P. Kopta,
222 views
Identity-Based Cryptography for Grid Security
40 views
Identity Federation and Attribute-based Authorization through the Globus Toolkit, Shibboleth, GridShib, and MyProxy Tom Barton 1, Jim Basney 2, Tim Freeman
220 views
A user-friendly approach to grid security Bruce Beckles University of Cambridge Computing Service A user-friendly approach to grid security “Grid ‘security’?
217 views
Tom Barton 1 , Jim Basney 2 , Tim Freeman 1 , Tom Scavo 2 ,
54 views
A user-friendly approach to grid security
52 views
Running AliEn Secure Services
61 views