The design, development and application of a proxy credential auditing infrastructure for collaborative research

Christopher Bayliss*, Richard O. Sinnott, Wei Jie, Junaid Arshad

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
    Original languageEnglish
    Title of host publicationE-Technologies
    Subtitle of host publicationTransformation in a Connected World - 5th International Conference, MCETECH 2011, Revised Selected Papers
    PublisherSpringer Verlag
    Pages211-226
    Number of pages16
    ISBN (Print)9783642208614
    DOIs
    Publication statusPublished (VoR) - 2011

    Publication series

    NameLecture Notes in Business Information Processing
    Volume78 LNBIP
    ISSN (Print)1865-1348

    Keywords

    • grid computing
    • grid security
    • proxy certificate
    • public key infrastructure
    • user authentication

    Fingerprint

    Dive into the research topics of 'The design, development and application of a proxy credential auditing infrastructure for collaborative research'. Together they form a unique fingerprint.

    Cite this