001     843567
005     20210129232552.0
024 7 _ |a 10.1109/AINS.2017.8270434
|2 doi
037 _ _ |a FZJ-2018-01153
100 1 _ |a Memon, Ahmed
|0 P:(DE-Juel1)132191
|b 0
|e Corresponding author
111 2 _ |a 2017 IEEE Conference on Application, Information and Network Security (AINS)
|c Miri
|d 2017-11-13 - 2017-11-14
|w Sarawak
245 _ _ |a Implementing an Authorisation Architecture in the EUDAT Services Federation
260 _ _ |c 2017
|b IEEE
300 _ _ |a 111-117
336 7 _ |a CONFERENCE_PAPER
|2 ORCID
336 7 _ |a Conference Paper
|0 33
|2 EndNote
336 7 _ |a INPROCEEDINGS
|2 BibTeX
336 7 _ |a conferenceObject
|2 DRIVER
336 7 _ |a Output Types/Conference Paper
|2 DataCite
336 7 _ |a Contribution to a conference proceedings
|b contrib
|m contrib
|0 PUB:(DE-HGF)8
|s 1517841829_21916
|2 PUB:(DE-HGF)
520 _ _ |a This paper describes the requirements and architecture of authorisation in a multi-disciplinary, multi-site, multi-stakeholder infrastructure which is using federated identity management. Stakeholders include administrators of sites, infrastructure, services, as well as data owners and community representatives. In order to be able to express and combine policies, we have based the authorisation infrastructure on XACML.
536 _ _ |a 512 - Data-Intensive Science and Federated Computing (POF3-512)
|0 G:(DE-HGF)POF3-512
|c POF3-512
|f POF III
|x 0
536 _ _ |a EUDAT2020 - EUDAT2020 (654065)
|0 G:(EU-Grant)654065
|c 654065
|f H2020-EINFRA-2014-2
|x 1
588 _ _ |a Dataset connected to CrossRef Conference
700 1 _ |a Jensen, Jens
|0 P:(DE-HGF)0
|b 1
700 1 _ |a Elbers, Willem
|0 P:(DE-HGF)0
|b 2
700 1 _ |a Riedel, Morris
|0 P:(DE-Juel1)132239
|b 3
700 1 _ |a Neukirchen, Helmut
|0 P:(DE-HGF)0
|b 4
700 1 _ |a Book, Matthias
|0 P:(DE-HGF)0
|b 5
773 _ _ |a 10.1109/AINS.2017.8270434
856 4 _ |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.pdf
|y Restricted
856 4 _ |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.gif?subformat=icon
|x icon
|y Restricted
856 4 _ |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.jpg?subformat=icon-1440
|x icon-1440
|y Restricted
856 4 _ |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.jpg?subformat=icon-180
|x icon-180
|y Restricted
856 4 _ |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.jpg?subformat=icon-640
|x icon-640
|y Restricted
856 4 _ |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.pdf?subformat=pdfa
|x pdfa
|y Restricted
909 C O |o oai:juser.fz-juelich.de:843567
|p openaire
|p VDB
|p ec_fundedresources
910 1 _ |a Forschungszentrum Jülich
|0 I:(DE-588b)5008462-8
|k FZJ
|b 0
|6 P:(DE-Juel1)132191
910 1 _ |a Forschungszentrum Jülich
|0 I:(DE-588b)5008462-8
|k FZJ
|b 3
|6 P:(DE-Juel1)132239
913 1 _ |a DE-HGF
|b Key Technologies
|1 G:(DE-HGF)POF3-510
|0 G:(DE-HGF)POF3-512
|2 G:(DE-HGF)POF3-500
|v Data-Intensive Science and Federated Computing
|x 0
|4 G:(DE-HGF)POF
|3 G:(DE-HGF)POF3
|l Supercomputing & Big Data
914 1 _ |y 2017
920 1 _ |0 I:(DE-Juel1)JSC-20090406
|k JSC
|l Jülich Supercomputing Center
|x 0
980 _ _ |a contrib
980 _ _ |a VDB
980 _ _ |a I:(DE-Juel1)JSC-20090406
980 _ _ |a UNRESTRICTED


LibraryCollectionCLSMajorCLSMinorLanguageAuthor
Marc 21