<--- Back to Details
First PageDocument Content
Identity management / Computer access control / EduGAIN / Cryptography / TERENA / Authentication / Computer security / Security
Date: 2016-01-25 09:54:07
Identity management
Computer access control
EduGAIN
Cryptography
TERENA
Authentication
Computer security
Security

Authentication and Authorisation for Research and Collaboration AARC Christos Kanellopoulos AARC Architecture WP Leader

Add to Reading List

Source URL: aarc-project.eu

Download Document from Source Website

File Size: 907,62 KB

Share Document on Facebook

Similar Documents

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

DocID: 1voGj - View Document

Towards Accelerated Usage Control Based on Access Correlations Richard Gay, Jinwei Hu, Heiko Mantel, and Johannes Schickel Department of Computer Science, TU Darmstadt, Germany

DocID: 1vgjd - View Document

Access Control and Key Management for Mobile Agents Volker Roth 1 and Mehrdad Jalali-Sohi 2 Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany

DocID: 1vfkA - View Document

Synthesising Verified Access Control Systems through Model Checking Nan Zhang, Mark Ryan∗ School of Computer Science University of Birmingham {nxz,mdr}@cs.bham.ac.uk

DocID: 1uYGS - View Document

Verification of agent knowledge in dynamic access control policies∗ Masoud Koleini, Eike Ritter and Mark Ryan School of Computer Science The University of Birmingham Birmingham, B15 2TT, UK

DocID: 1uPvL - View Document