Implementing X.509 Security Certificate Based Authentication in a Virtual Organization

Implementing X.509 Security Certificate Based Authentication in a Virtual Organization
Author :
Publisher :
Total Pages : 76
Release :
ISBN-10 : OCLC:876610879
ISBN-13 :
Rating : 4/5 (79 Downloads)

Book Synopsis Implementing X.509 Security Certificate Based Authentication in a Virtual Organization by : Veerendra Shirole

Download or read book Implementing X.509 Security Certificate Based Authentication in a Virtual Organization written by Veerendra Shirole and published by . This book was released on 2011 with total page 76 pages. Available in PDF, EPUB and Kindle. Book excerpt: In recent years, research institutions have shown great interest in forming Virtual Organizations (VO) as a cost effective alternative to maintaining dedicated resources for computationally intensive tasks. Shibboleth is an infrastructure used to provide the facility of single sign-on in many VOs. However, implementation of the Shibboleth infrastructure is a huge challenge that entails conformance to the policies of the institution that participates in the VO. Therefore in the absence of a Shibboleth authentication mechanism at a user's home institution, it may not be possible for users of a participating institution to access resources belonging to other institutions in the VO. This thesis addresses the issue of authenticating users who do not possess Shibboleth credentials, but are authentic users that need access to the resources in a VO. Lately, X.509 security certificates have gained immense popularity as a method for verifying the identity of a person. These certificates can be used to authenticate users on any system that trusts the certificate's signing Certificate Authority. Incorporating support for certificate-based authentication in the VO helps to authenticate users that belong to the research environment, but do not necessarily have Shibboleth credentials. Thus, certificate-based authentication increases the resource providing capability of the research environment by servicing all the users that are entitled to use resources in the VO.


Implementing X.509 Security Certificate Based Authentication in a Virtual Organization Related Books

Implementing X.509 Security Certificate Based Authentication in a Virtual Organization
Language: en
Pages: 76
Authors: Veerendra Shirole
Categories: Electronic Dissertations
Type: BOOK - Published: 2011 - Publisher:

DOWNLOAD EBOOK

In recent years, research institutions have shown great interest in forming Virtual Organizations (VO) as a cost effective alternative to maintaining dedicated
Information Security Management Handbook
Language: en
Pages: 3280
Authors: Harold F. Tipton
Categories: Business & Economics
Type: BOOK - Published: 2007-05-14 - Publisher: CRC Press

DOWNLOAD EBOOK

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundam
Network Security: Perspectives And Challenges
Language: en
Pages:
Authors: M.V.Ramana Murthy, S.Jeelani
Categories: Antiques & Collectibles
Type: BOOK - Published: - Publisher: Archers & Elevators Publishing House

DOWNLOAD EBOOK

Grid Computing Security
Language: en
Pages: 336
Authors: Anirban Chakrabarti
Categories: Computers
Type: BOOK - Published: 2007-05-26 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Based on research and industry experience, this book structures the issues pertaining to grid computing security into three main categories: architecture-relate
Grid Enabled Remote Instrumentation
Language: en
Pages: 583
Authors: Franco Davoli
Categories: Technology & Engineering
Type: BOOK - Published: 2008-10-10 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Grid architectures, which are viewed as tools for the integration of distributed resources, play a significant role as managers of computational resources, but