Screenshot

(0 Bewertung(en))

English
Videovortrag  –  GridKa School 2008
Erstellt am: 25.02.2009
Aktivität: 
Keywords: Sicherheit, EGEE
Abstract: This talk gives an introduction to Security Service Challenges in the context of the EGEE project. The motivation for these exercises and the practical execution are explained; in addition, the results within the Germany/Switzerland federation are discussed.
Screenshot

(0 Bewertung(en))

English
Section 2. Installing Computing Element
Lehrvideo  –  GridKa School 2008
Erstellt am: 21.04.2009
Aktivität: 
Abstract: This recording was created using documentation for a course of gLite Administration GridKa 2008 from Angela Poschlad (KIT) and Christoph Wissing (DESY). The CREAM CE stands for Computing Resource Execution and Management. This video provides a detailed example how to install and configure a combinat...
Screenshot

(0 Bewertung(en))

English
Videovortrag  –  GridKa School 2008
Erstellt am: 24.11.2008
Aktivität: 
Keywords: Sicherheit
Abstract: The public interest and awareness of Grid computing has increased over the last 12 months. This is set to continue as high profile experiments such as the LHC come online. Unfortunately, with this increase in interest comes a rise in the number of attacks to Grid sites. This talk will look at some o...
Screenshot

(0 Bewertung(en))

English
Section 1. Job Submission Sample.
Lehrvideo  –  GridKa School 2008
Erstellt am: 26.03.2009
Aktivität: 
Keywords: gLite
Abstract: This recording was created using documentation for a course of gLite Introduction GridKA08 from Manuel Zeise (IEKP). This video introduces Hello World Application on Grid.
Screenshot

(0 Bewertung(en))

English
An Outlook by the example of D-Grid Achieving Sustainability for Grids
Videovortrag  –  GridKa School 2008
Erstellt am: 19.03.2009
Aktivität: 
Keywords: Sicherheit, VOMS, D-Grid
Abstract: Different Grid infrastructures, as well as the German Grid Initiative (D-Grid), currently rely on simple identity-based mechanisms to authorize their users by mapping identities represented by user certificates to local system accounts. This simple way of authorization more and more meets its limits...
<< 1 / 7 >>
Legende: 
 Grundlagen 
 Fortgeschritten 
 Experten