The MyProxy online credential repository
نویسندگان
چکیده
منابع مشابه
The MyProxy online credential repository
The MyProxy online credential repository has been used by the grid computing community for over four years for managing security credentials in the grid public key infrastructure. MyProxy improves usability by giving users access to their credentials over the network using password authentication, allowing users to delegate their credentials via web browser interfaces to the grid, and supportin...
متن کاملAn Online Credential Repository for the Grid: MyProxy
Grid Portals, based on standard Web technologies, are increasingly used to provide user interfaces for Computational and Data Grids. However, such Grid Portals do not integrate cleanly with existing Grid security systems such as the Grid Security Infrastructure (GSI), due to lack of delegation capabilities in Web security mechanisms. We solve this problem using an online credentials repository ...
متن کاملCredential Wallets: A Classification of Credential Repositories Highlighting MyProxy
In recent years, individuals have experienced an increased requirement for digitally identifying themselves, in both their work and personal lives. People typically have multiple credentials for digitally identifying themselves to different online software or services in different roles (for example, different credentials for work and home). We are looking for technology that allows users to ma...
متن کاملOnline Img2UML Repository: An Online Repository for UML Models
The Img2UML repository is a repository of UML models. A huge amount of UML models is available on the Internet – mostly in the form of images. This repository aims to offer these UML class diagram as a searchable XMI Database. The information that is in the XMI files is stored in the repository database. This repository will be useful for research as the first corpus of UML models. This reposit...
متن کاملSecure Hardware Enhanced MyProxy
Traditionally, users either put their key on some sort of hardware device such as a smart card or USB token, or they place it directly on the hard disk such as in a browser or system keystore. Most modern operating systems (such as Windows and Mac OSX) include a keystore and a set of Cryptographic Service Providers (CSPs) which use the key. In fact, many cross-platform software systems, such as...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Software: Practice and Experience
سال: 2005
ISSN: 0038-0644,1097-024X
DOI: 10.1002/spe.688