Screenshot

(3 Bewertung(en))

English
Videovortrag  –  GridKa-School 2007
Erstellt am: 02.09.2008
Aktivität: 
Keywords: Sicherheit
Abstract: As a new and promising technology, Grid Computing provides the tool for cooperative work regarding large scale distributed computing projects. In the case of distributed resources, frequently sensitive company or scientific information are transmitted and computed. Therefore security mechanisms are ...
Screenshot

(0 Bewertung(en))

English
Videovortrag  –  GridKa School 2008
Erstellt am: 24.11.2008
Aktivität: 
Keywords: Sicherheit
Abstract: The public interest and awareness of Grid computing has increased over the last 12 months. This is set to continue as high profile experiments such as the LHC come online. Unfortunately, with this increase in interest comes a rise in the number of attacks to Grid sites. This talk will look at some o...
Screenshot

(0 Bewertung(en))

English
An Outlook by the example of D-Grid Achieving Sustainability for Grids
Videovortrag  –  GridKa School 2008
Erstellt am: 19.03.2009
Aktivität: 
Keywords: Sicherheit, VOMS, D-Grid
Abstract: Different Grid infrastructures, as well as the German Grid Initiative (D-Grid), currently rely on simple identity-based mechanisms to authorize their users by mapping identities represented by user certificates to local system accounts. This simple way of authorization more and more meets its limits...
Screenshot

(1 Bewertung(en))

English
Videovortrag  –  CoreGRID Summer School 2008  –  CoreGrid
Erstellt am: 21.10.2008
Aktivität: 
Keywords: SOA, Sicherheit
Abstract: This talk introduces the different concepts and technologies relevant to trust and security in Service-Oriented Architectures (SOA) and Service-Based Grids. We describe basic security concepts such as authentication, authorisation, secure communication, confidentiality and distributed trust, and sho...
Screenshot

(0 Bewertung(en))

Abstract: Das Tutorial beschäftigt sich mit den inhaltlichen Fragestellungen: Was passiert, wenn ein Grid-Job ausgefhrt wird? Wie wird verhindert, dass vertrauliche Informationen in die falschen Hände geraten? Wie wird verhindert, dass Personen Zugang zu vertraulichen Daten erhalten, die nicht dazu berechti...
<< 1 / 4 >>
Legende: 
 Grundlagen 
 Fortgeschritten 
 Experten