000843567 001__ 843567
000843567 005__ 20210129232552.0
000843567 0247_ $$2doi$$a10.1109/AINS.2017.8270434
000843567 037__ $$aFZJ-2018-01153
000843567 1001_ $$0P:(DE-Juel1)132191$$aMemon, Ahmed$$b0$$eCorresponding author
000843567 1112_ $$a2017 IEEE Conference on Application, Information and Network Security (AINS)$$cMiri$$d2017-11-13 - 2017-11-14$$wSarawak
000843567 245__ $$aImplementing an Authorisation Architecture in the EUDAT Services Federation
000843567 260__ $$bIEEE$$c2017
000843567 300__ $$a111-117
000843567 3367_ $$2ORCID$$aCONFERENCE_PAPER
000843567 3367_ $$033$$2EndNote$$aConference Paper
000843567 3367_ $$2BibTeX$$aINPROCEEDINGS
000843567 3367_ $$2DRIVER$$aconferenceObject
000843567 3367_ $$2DataCite$$aOutput Types/Conference Paper
000843567 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings$$bcontrib$$mcontrib$$s1517841829_21916
000843567 520__ $$aThis paper describes the requirements and architecture of authorisation in a multi-disciplinary, multi-site, multi-stakeholder infrastructure which is using federated identity management. Stakeholders include administrators of sites, infrastructure, services, as well as data owners and community representatives. In order to be able to express and combine policies, we have based the authorisation infrastructure on XACML.
000843567 536__ $$0G:(DE-HGF)POF3-512$$a512 - Data-Intensive Science and Federated Computing (POF3-512)$$cPOF3-512$$fPOF III$$x0
000843567 536__ $$0G:(EU-Grant)654065$$aEUDAT2020 - EUDAT2020 (654065)$$c654065$$fH2020-EINFRA-2014-2$$x1
000843567 588__ $$aDataset connected to CrossRef Conference
000843567 7001_ $$0P:(DE-HGF)0$$aJensen, Jens$$b1
000843567 7001_ $$0P:(DE-HGF)0$$aElbers, Willem$$b2
000843567 7001_ $$0P:(DE-Juel1)132239$$aRiedel, Morris$$b3
000843567 7001_ $$0P:(DE-HGF)0$$aNeukirchen, Helmut$$b4
000843567 7001_ $$0P:(DE-HGF)0$$aBook, Matthias$$b5
000843567 773__ $$a10.1109/AINS.2017.8270434
000843567 8564_ $$uhttps://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.pdf$$yRestricted
000843567 8564_ $$uhttps://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.gif?subformat=icon$$xicon$$yRestricted
000843567 8564_ $$uhttps://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.jpg?subformat=icon-1440$$xicon-1440$$yRestricted
000843567 8564_ $$uhttps://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.jpg?subformat=icon-180$$xicon-180$$yRestricted
000843567 8564_ $$uhttps://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.jpg?subformat=icon-640$$xicon-640$$yRestricted
000843567 8564_ $$uhttps://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.pdf?subformat=pdfa$$xpdfa$$yRestricted
000843567 909CO $$ooai:juser.fz-juelich.de:843567$$pec_fundedresources$$pVDB$$popenaire
000843567 9101_ $$0I:(DE-588b)5008462-8$$6P:(DE-Juel1)132191$$aForschungszentrum Jülich$$b0$$kFZJ
000843567 9101_ $$0I:(DE-588b)5008462-8$$6P:(DE-Juel1)132239$$aForschungszentrum Jülich$$b3$$kFZJ
000843567 9131_ $$0G:(DE-HGF)POF3-512$$1G:(DE-HGF)POF3-510$$2G:(DE-HGF)POF3-500$$3G:(DE-HGF)POF3$$4G:(DE-HGF)POF$$aDE-HGF$$bKey Technologies$$lSupercomputing & Big Data$$vData-Intensive Science and Federated Computing$$x0
000843567 9141_ $$y2017
000843567 9201_ $$0I:(DE-Juel1)JSC-20090406$$kJSC$$lJülich Supercomputing Center$$x0
000843567 980__ $$acontrib
000843567 980__ $$aVDB
000843567 980__ $$aI:(DE-Juel1)JSC-20090406
000843567 980__ $$aUNRESTRICTED