000017784 001__ 17784 000017784 005__ 20210129210659.0 000017784 0247_ $$2DOI$$a10.1016/j.future.2010.08.009 000017784 0247_ $$2WOS$$aWOS:000284339200006 000017784 037__ $$aPreJuSER-17784 000017784 041__ $$aeng 000017784 082__ $$a004 000017784 084__ $$2WoS$$aComputer Science, Theory & Methods 000017784 1001_ $$0P:(DE-HGF)0$$aBenedyczak, K.$$b0 000017784 245__ $$aKey aspects of the UNICORE 6 security model 000017784 260__ $$aAmsterdam [u.a.]$$bElsevier Science$$c2011 000017784 300__ $$a195 - 201 000017784 3367_ $$0PUB:(DE-HGF)16$$2PUB:(DE-HGF)$$aJournal Article 000017784 3367_ $$2DataCite$$aOutput Types/Journal article 000017784 3367_ $$00$$2EndNote$$aJournal Article 000017784 3367_ $$2BibTeX$$aARTICLE 000017784 3367_ $$2ORCID$$aJOURNAL_ARTICLE 000017784 3367_ $$2DRIVER$$aarticle 000017784 440_0 $$012183$$aFuture Generation Computer Systems$$v27$$x0167-739X$$y2 000017784 500__ $$aRecord converted from VDB: 12.11.2012 000017784 520__ $$aThis paper presents the security architecture of the sixth version of the UNICORE grid middleware The sixth iteration of UNICORE introduced a number of new security-related solutions which make UNICORE distinguishable from the other grid middleware as Globus gLite or NorduGrid ARC and these are presented in this paper The paper discusses the low level security users authentication non-repudiation control and trust delegation The UNICORE unique approach to the challenge of trust delegation is called explicit trust delegation (ETD) discussion of this constitutes the most significant and extensive part of this paper ETD is compared with the popular grid security Infrastructure (GSI) High level security services (such as authorization services) are not described in this paper (C) 2010 Elsevier B V All rights reserved 000017784 536__ $$0G:(DE-Juel1)FUEK411$$2G:(DE-HGF)$$aScientific Computing (FUEK411)$$cFUEK411$$x0 000017784 536__ $$0G:(DE-HGF)POF2-412$$a412 - Grid Technologies and Infrastructures (POF2-412)$$cPOF2-412$$fPOF II$$x1 000017784 588__ $$aDataset connected to Web of Science 000017784 650_7 $$2WoSType$$aJ 000017784 65320 $$2Author$$aSecurity 000017784 7001_ $$0P:(DE-HGF)0$$aBala, P.$$b1 000017784 7001_ $$0P:(DE-HGF)0$$avan den Berghe, S.$$b2 000017784 7001_ $$0P:(DE-HGF)0$$aMenday, R.$$b3 000017784 7001_ $$0P:(DE-Juel1)132261$$aSchuller, B.$$b4$$uFZJ 000017784 773__ $$0PERI:(DE-600)2020551-X$$a10.1016/j.future.2010.08.009$$gVol. 27, p. 195 - 201$$p195 - 201$$q27<195 - 201$$tFuture generation computer systems$$v27$$x0167-739X$$y2011 000017784 8567_ $$uhttp://dx.doi.org/10.1016/j.future.2010.08.009 000017784 909CO $$ooai:juser.fz-juelich.de:17784$$pVDB 000017784 9132_ $$0G:(DE-HGF)POF3-512$$1G:(DE-HGF)POF3-510$$2G:(DE-HGF)POF3-500$$aDE-HGF$$bKey Technologies$$lSupercomputing & Big Data $$vData-Intensive Science and Federated Computing$$x0 000017784 9131_ $$0G:(DE-HGF)POF2-412$$1G:(DE-HGF)POF2-410$$2G:(DE-HGF)POF2-400$$3G:(DE-HGF)POF2$$4G:(DE-HGF)POF$$aDE-HGF$$bSchlüsseltechnologien$$lSupercomputing$$vGrid Technologies and Infrastructures$$x1 000017784 9141_ $$y2011 000017784 915__ $$0StatID:(DE-HGF)0010$$aJCR/ISI refereed 000017784 9201_ $$0I:(DE-Juel1)JSC-20090406$$gJSC$$kJSC$$lJülich Supercomputing Centre$$x0 000017784 970__ $$aVDB:(DE-Juel1)132350 000017784 980__ $$aVDB 000017784 980__ $$aConvertedRecord 000017784 980__ $$ajournal 000017784 980__ $$aI:(DE-Juel1)JSC-20090406 000017784 980__ $$aUNRESTRICTED