Single sign-on and delegation of privileges are fundamental tenets upon which e-Infrastructures and Grid-based research more generally have been based. The realisation of single sign-on and delegation of privileges in accessing resources such as the UK e-Science National Grid Service is typically facilitated by X.509-based Public Key Infrastructures (PKI) and exploitation of proxy certificates. This model can be categorised by authentication-oriented access and usage of resources. It is the case however that proxy certificates, can potentially be obtained and abused by a malicious third party without the knowledge of the holder. In this paper we describe a novel proxy auditing solution that addresses this issue directly. We describe the des...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
This is a pre-print of a paper from Proceedings of the UK e-Science All Hands Meeting 2005 published...
Abstract—Single sign-on and delegation of privileges are fun-damental tenets upon which e-Infrastruc...
Proxy credentials are commonly used in security systems when one entity wishes to grant to another e...
One major problem faced by end-users and administrators of computational grid environments arise in ...
E-Science Grid infrastructures are established on the collaboration of multiple and possibly otherwi...
AbstractThe paper describes some special aspects of the security infrastructure for distributed com-...
Despite recent widespread interest in the secure authentication of principals across computer networ...
[[abstract]]GSI (Grid Security Infrastructure) provides the security in grids that it is using proxy...
Simplifying access to and usage of large scale compute resources via the grid is of critical importa...
open access journalA Public Key Infrastructure (PKI) is considered one of the most important techniq...
Security underpins grids and e-research. Without a robust, reliable and simple grid security infrast...
Grid technologies support collaborative e-Research typified by multiple institutions and resources s...
Abstract. Credentials like passwords or cryptographic key pairs are a means to prove one’s identity ...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
This is a pre-print of a paper from Proceedings of the UK e-Science All Hands Meeting 2005 published...
Abstract—Single sign-on and delegation of privileges are fun-damental tenets upon which e-Infrastruc...
Proxy credentials are commonly used in security systems when one entity wishes to grant to another e...
One major problem faced by end-users and administrators of computational grid environments arise in ...
E-Science Grid infrastructures are established on the collaboration of multiple and possibly otherwi...
AbstractThe paper describes some special aspects of the security infrastructure for distributed com-...
Despite recent widespread interest in the secure authentication of principals across computer networ...
[[abstract]]GSI (Grid Security Infrastructure) provides the security in grids that it is using proxy...
Simplifying access to and usage of large scale compute resources via the grid is of critical importa...
open access journalA Public Key Infrastructure (PKI) is considered one of the most important techniq...
Security underpins grids and e-research. Without a robust, reliable and simple grid security infrast...
Grid technologies support collaborative e-Research typified by multiple institutions and resources s...
Abstract. Credentials like passwords or cryptographic key pairs are a means to prove one’s identity ...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
This is a pre-print of a paper from Proceedings of the UK e-Science All Hands Meeting 2005 published...