AbstractThe paper describes some special aspects of the security infrastructure for distributed com- puting systems. Most heterogeneous and geographically dispersed distributed computing systems, e.g. GRID, use the Public Key Infrastructure (PKI). One of the main problem in such systems is the necessity to use time-limited proxy certificates for delegation of rights from user to an execution remote service which acts on behalf of the user. The problem is that there exists a contradiction between the limited lifetime of the proxy certificates and unpredictable time of the request processing. Our approach allows to avoid using the proxy certificates. This makes the security infrastructure of distributed computing systems simpler for developme...
Single sign-on and delegation of privileges are fundamental tenets upon which e-Infrastructures and ...
Delegation is frequently used in real world. In order to make it possible in on-line, the fact of de...
We propose Proxy Certificate Trust List (PCTL) to efficiently record delegation traces for grid comp...
AbstractThe paper describes some special aspects of the security infrastructure for distributed com-...
[[abstract]]GSI (Grid Security Infrastructure) provides the security in grids that it is using proxy...
Proxy credentials are commonly used in security systems when one entity wishes to grant to another e...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
In this paper we present a computational infrastructure, the Security Backbone, which is able to sat...
ABSTRACT: This paper looks at the problem of privilege delegation and revocation in distributed perv...
Abstract: Security is a very important aspect of any computing systems, and has become a serious pro...
The dynamic and public nature of a large scale public distributed system introduces challenging sec...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
Sharing information and maintaining privacy and security is a requirement in distributed environment...
One function of the Grid is to support collaborative science projects on the internet. While some pr...
Proxies can provide valuable services for today's increasingly heterogeneous computing environm...
Single sign-on and delegation of privileges are fundamental tenets upon which e-Infrastructures and ...
Delegation is frequently used in real world. In order to make it possible in on-line, the fact of de...
We propose Proxy Certificate Trust List (PCTL) to efficiently record delegation traces for grid comp...
AbstractThe paper describes some special aspects of the security infrastructure for distributed com-...
[[abstract]]GSI (Grid Security Infrastructure) provides the security in grids that it is using proxy...
Proxy credentials are commonly used in security systems when one entity wishes to grant to another e...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
In this paper we present a computational infrastructure, the Security Backbone, which is able to sat...
ABSTRACT: This paper looks at the problem of privilege delegation and revocation in distributed perv...
Abstract: Security is a very important aspect of any computing systems, and has become a serious pro...
The dynamic and public nature of a large scale public distributed system introduces challenging sec...
A proxy signature scheme permits an entity to delegate its signing rights to another entity. These s...
Sharing information and maintaining privacy and security is a requirement in distributed environment...
One function of the Grid is to support collaborative science projects on the internet. While some pr...
Proxies can provide valuable services for today's increasingly heterogeneous computing environm...
Single sign-on and delegation of privileges are fundamental tenets upon which e-Infrastructures and ...
Delegation is frequently used in real world. In order to make it possible in on-line, the fact of de...
We propose Proxy Certificate Trust List (PCTL) to efficiently record delegation traces for grid comp...