000017784 001__ 17784
000017784 005__ 20210129210659.0
000017784 0247_ $$2DOI$$a10.1016/j.future.2010.08.009
000017784 0247_ $$2WOS$$aWOS:000284339200006
000017784 037__ $$aPreJuSER-17784
000017784 041__ $$aeng
000017784 082__ $$a004
000017784 084__ $$2WoS$$aComputer Science, Theory & Methods
000017784 1001_ $$0P:(DE-HGF)0$$aBenedyczak, K.$$b0
000017784 245__ $$aKey aspects of the UNICORE 6 security model
000017784 260__ $$aAmsterdam [u.a.]$$bElsevier Science$$c2011
000017784 300__ $$a195 - 201
000017784 3367_ $$0PUB:(DE-HGF)16$$2PUB:(DE-HGF)$$aJournal Article
000017784 3367_ $$2DataCite$$aOutput Types/Journal article
000017784 3367_ $$00$$2EndNote$$aJournal Article
000017784 3367_ $$2BibTeX$$aARTICLE
000017784 3367_ $$2ORCID$$aJOURNAL_ARTICLE
000017784 3367_ $$2DRIVER$$aarticle
000017784 440_0 $$012183$$aFuture Generation Computer Systems$$v27$$x0167-739X$$y2
000017784 500__ $$aRecord converted from VDB: 12.11.2012
000017784 520__ $$aThis paper presents the security architecture of the sixth version of the UNICORE grid middleware The sixth iteration of UNICORE introduced a number of new security-related solutions which make UNICORE distinguishable from the other grid middleware as Globus gLite or NorduGrid ARC and these are presented in this paper The paper discusses the low level security users authentication non-repudiation control and trust delegation The UNICORE unique approach to the challenge of trust delegation is called explicit trust delegation (ETD) discussion of this constitutes the most significant and extensive part of this paper ETD is compared with the popular grid security Infrastructure (GSI) High level security services (such as authorization services) are not described in this paper (C) 2010 Elsevier B V All rights reserved
000017784 536__ $$0G:(DE-Juel1)FUEK411$$2G:(DE-HGF)$$aScientific Computing (FUEK411)$$cFUEK411$$x0
000017784 536__ $$0G:(DE-HGF)POF2-412$$a412 - Grid Technologies and Infrastructures (POF2-412)$$cPOF2-412$$fPOF II$$x1
000017784 588__ $$aDataset connected to Web of Science
000017784 650_7 $$2WoSType$$aJ
000017784 65320 $$2Author$$aSecurity
000017784 7001_ $$0P:(DE-HGF)0$$aBala, P.$$b1
000017784 7001_ $$0P:(DE-HGF)0$$avan den Berghe, S.$$b2
000017784 7001_ $$0P:(DE-HGF)0$$aMenday, R.$$b3
000017784 7001_ $$0P:(DE-Juel1)132261$$aSchuller, B.$$b4$$uFZJ
000017784 773__ $$0PERI:(DE-600)2020551-X$$a10.1016/j.future.2010.08.009$$gVol. 27, p. 195 - 201$$p195 - 201$$q27<195 - 201$$tFuture generation computer systems$$v27$$x0167-739X$$y2011
000017784 8567_ $$uhttp://dx.doi.org/10.1016/j.future.2010.08.009
000017784 909CO $$ooai:juser.fz-juelich.de:17784$$pVDB
000017784 9132_ $$0G:(DE-HGF)POF3-512$$1G:(DE-HGF)POF3-510$$2G:(DE-HGF)POF3-500$$aDE-HGF$$bKey Technologies$$lSupercomputing & Big Data $$vData-Intensive Science and Federated Computing$$x0
000017784 9131_ $$0G:(DE-HGF)POF2-412$$1G:(DE-HGF)POF2-410$$2G:(DE-HGF)POF2-400$$3G:(DE-HGF)POF2$$4G:(DE-HGF)POF$$aDE-HGF$$bSchlüsseltechnologien$$lSupercomputing$$vGrid Technologies and Infrastructures$$x1
000017784 9141_ $$y2011
000017784 915__ $$0StatID:(DE-HGF)0010$$aJCR/ISI refereed
000017784 9201_ $$0I:(DE-Juel1)JSC-20090406$$gJSC$$kJSC$$lJülich Supercomputing Centre$$x0
000017784 970__ $$aVDB:(DE-Juel1)132350
000017784 980__ $$aVDB
000017784 980__ $$aConvertedRecord
000017784 980__ $$ajournal
000017784 980__ $$aI:(DE-Juel1)JSC-20090406
000017784 980__ $$aUNRESTRICTED