Securing collaborative environments [electronic resource]
The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution need...
Saved in:
Online Access: |
Online Access |
---|---|
Main Authors: | , , |
Corporate Author: | |
Format: | Government Document Electronic eBook |
Language: | English |
Published: |
Washington, D.C. : Oak Ridge, Tenn. :
United States. Department of Energy. Office of Advanced Scientific Computing Research ; distributed by the Office of Scientific and Technical Information, U.S. Department of Energy,
2002.
|
Subjects: |
Summary: | The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments. Collaboration Pki Proxy Security. |
---|---|
Item Description: | Published through SciTech Connect. 05/16/2002. "lbnl--50427" "B& R KJ0102000" Second Workshop on Advanced Collaborative Environments, Edinburgh, Scotland (GB), 07/26/2002. Thompson, Mary; Agarwal, Deborah; Jackson, Keith. |
Physical Description: | vp. : digital, PDF file. |