Network security: private communication in a public world
Network security: private communication in a public world
The grid: blueprint for a new computing infrastructure
The grid: blueprint for a new computing infrastructure
MPI and Java-MPI: contrasts and comparisons of low-level communication performance
SC '99 Proceedings of the 1999 ACM/IEEE conference on Supercomputing
Java Native Interface: Programmer's Guide and Reference
Java Native Interface: Programmer's Guide and Reference
Legion: The Next Logical Step Toward a Nationwide Virtual Computer
Legion: The Next Logical Step Toward a Nationwide Virtual Computer
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Hi-index | 0.00 |
In recent years, numerous projects focusing on utilization of geographically-distributed environments have called upon certificates and certificate authorities for authentication, for validation, and for assigning access privileges to groups. This paper describes a prototype established for utilizing certificates in the IceT environment for facilitating merging of resource groups. This prototype extends this paradigm to leverage significantly upon certificate revocation lists to permit predictable, dynamic splittings of groups.