| Home > Publications database > Implementing an Authorisation Architecture in the EUDAT Services Federation > print |
| 001 | 843567 | ||
| 005 | 20210129232552.0 | ||
| 024 | 7 | _ | |a 10.1109/AINS.2017.8270434 |2 doi |
| 037 | _ | _ | |a FZJ-2018-01153 |
| 100 | 1 | _ | |a Memon, Ahmed |0 P:(DE-Juel1)132191 |b 0 |e Corresponding author |
| 111 | 2 | _ | |a 2017 IEEE Conference on Application, Information and Network Security (AINS) |c Miri |d 2017-11-13 - 2017-11-14 |w Sarawak |
| 245 | _ | _ | |a Implementing an Authorisation Architecture in the EUDAT Services Federation |
| 260 | _ | _ | |c 2017 |b IEEE |
| 300 | _ | _ | |a 111-117 |
| 336 | 7 | _ | |a CONFERENCE_PAPER |2 ORCID |
| 336 | 7 | _ | |a Conference Paper |0 33 |2 EndNote |
| 336 | 7 | _ | |a INPROCEEDINGS |2 BibTeX |
| 336 | 7 | _ | |a conferenceObject |2 DRIVER |
| 336 | 7 | _ | |a Output Types/Conference Paper |2 DataCite |
| 336 | 7 | _ | |a Contribution to a conference proceedings |b contrib |m contrib |0 PUB:(DE-HGF)8 |s 1517841829_21916 |2 PUB:(DE-HGF) |
| 520 | _ | _ | |a This paper describes the requirements and architecture of authorisation in a multi-disciplinary, multi-site, multi-stakeholder infrastructure which is using federated identity management. Stakeholders include administrators of sites, infrastructure, services, as well as data owners and community representatives. In order to be able to express and combine policies, we have based the authorisation infrastructure on XACML. |
| 536 | _ | _ | |a 512 - Data-Intensive Science and Federated Computing (POF3-512) |0 G:(DE-HGF)POF3-512 |c POF3-512 |f POF III |x 0 |
| 536 | _ | _ | |a EUDAT2020 - EUDAT2020 (654065) |0 G:(EU-Grant)654065 |c 654065 |f H2020-EINFRA-2014-2 |x 1 |
| 588 | _ | _ | |a Dataset connected to CrossRef Conference |
| 700 | 1 | _ | |a Jensen, Jens |0 P:(DE-HGF)0 |b 1 |
| 700 | 1 | _ | |a Elbers, Willem |0 P:(DE-HGF)0 |b 2 |
| 700 | 1 | _ | |a Riedel, Morris |0 P:(DE-Juel1)132239 |b 3 |
| 700 | 1 | _ | |a Neukirchen, Helmut |0 P:(DE-HGF)0 |b 4 |
| 700 | 1 | _ | |a Book, Matthias |0 P:(DE-HGF)0 |b 5 |
| 773 | _ | _ | |a 10.1109/AINS.2017.8270434 |
| 856 | 4 | _ | |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.pdf |y Restricted |
| 856 | 4 | _ | |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.gif?subformat=icon |x icon |y Restricted |
| 856 | 4 | _ | |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.jpg?subformat=icon-1440 |x icon-1440 |y Restricted |
| 856 | 4 | _ | |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.jpg?subformat=icon-180 |x icon-180 |y Restricted |
| 856 | 4 | _ | |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.jpg?subformat=icon-640 |x icon-640 |y Restricted |
| 856 | 4 | _ | |u https://juser.fz-juelich.de/record/843567/files/implementing-authorisation-architecture-memon.pdf?subformat=pdfa |x pdfa |y Restricted |
| 909 | C | O | |o oai:juser.fz-juelich.de:843567 |p openaire |p VDB |p ec_fundedresources |
| 910 | 1 | _ | |a Forschungszentrum Jülich |0 I:(DE-588b)5008462-8 |k FZJ |b 0 |6 P:(DE-Juel1)132191 |
| 910 | 1 | _ | |a Forschungszentrum Jülich |0 I:(DE-588b)5008462-8 |k FZJ |b 3 |6 P:(DE-Juel1)132239 |
| 913 | 1 | _ | |a DE-HGF |b Key Technologies |1 G:(DE-HGF)POF3-510 |0 G:(DE-HGF)POF3-512 |2 G:(DE-HGF)POF3-500 |v Data-Intensive Science and Federated Computing |x 0 |4 G:(DE-HGF)POF |3 G:(DE-HGF)POF3 |l Supercomputing & Big Data |
| 914 | 1 | _ | |y 2017 |
| 920 | 1 | _ | |0 I:(DE-Juel1)JSC-20090406 |k JSC |l Jülich Supercomputing Center |x 0 |
| 980 | _ | _ | |a contrib |
| 980 | _ | _ | |a VDB |
| 980 | _ | _ | |a I:(DE-Juel1)JSC-20090406 |
| 980 | _ | _ | |a UNRESTRICTED |
| Library | Collection | CLSMajor | CLSMinor | Language | Author |
|---|