Cargando…
EMI Security Architecture
This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed...
Autores principales: | , , , , , , , , , , , , , , , , |
---|---|
Lenguaje: | eng |
Publicado: |
2013
|
Acceso en línea: | https://dx.doi.org/10.5281/ZENODO.5959 http://cds.cern.ch/record/1543541 |
_version_ | 1780929998528446464 |
---|---|
author | White, J. Mikkonen, H. Schuller, B. Qiang, W. Groep, D. Koeroo, O. Salle, M. Sustr, Z. Kouril, D. Millar, P. Benedyczak, K. Ceccanti, A. Leinen, S. Tschopp, V. Fuhrmann, P. Heyman, E. Konstantinov, A. |
author_facet | White, J. Mikkonen, H. Schuller, B. Qiang, W. Groep, D. Koeroo, O. Salle, M. Sustr, Z. Kouril, D. Millar, P. Benedyczak, K. Ceccanti, A. Leinen, S. Tschopp, V. Fuhrmann, P. Heyman, E. Konstantinov, A. |
author_sort | White, J. |
collection | CERN |
description | This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project. |
id | cern-1543541 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2013 |
record_format | invenio |
spelling | cern-15435412022-01-13T20:45:52Zdoi:10.5281/ZENODO.5959http://cds.cern.ch/record/1543541engWhite, J.Mikkonen, H.Schuller, B.Qiang, W.Groep, D.Koeroo, O.Salle, M.Sustr, Z.Kouril, D.Millar, P.Benedyczak, K.Ceccanti, A.Leinen, S.Tschopp, V.Fuhrmann, P.Heyman, E.Konstantinov, A.EMI Security ArchitectureThis document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.EMI-JRA1-TD016oai:cds.cern.ch:15435412013 |
spellingShingle | White, J. Mikkonen, H. Schuller, B. Qiang, W. Groep, D. Koeroo, O. Salle, M. Sustr, Z. Kouril, D. Millar, P. Benedyczak, K. Ceccanti, A. Leinen, S. Tschopp, V. Fuhrmann, P. Heyman, E. Konstantinov, A. EMI Security Architecture |
title | EMI Security Architecture |
title_full | EMI Security Architecture |
title_fullStr | EMI Security Architecture |
title_full_unstemmed | EMI Security Architecture |
title_short | EMI Security Architecture |
title_sort | emi security architecture |
url | https://dx.doi.org/10.5281/ZENODO.5959 http://cds.cern.ch/record/1543541 |
work_keys_str_mv | AT whitej emisecurityarchitecture AT mikkonenh emisecurityarchitecture AT schullerb emisecurityarchitecture AT qiangw emisecurityarchitecture AT groepd emisecurityarchitecture AT koerooo emisecurityarchitecture AT sallem emisecurityarchitecture AT sustrz emisecurityarchitecture AT kourild emisecurityarchitecture AT millarp emisecurityarchitecture AT benedyczakk emisecurityarchitecture AT ceccantia emisecurityarchitecture AT leinens emisecurityarchitecture AT tschoppv emisecurityarchitecture AT fuhrmannp emisecurityarchitecture AT heymane emisecurityarchitecture AT konstantinova emisecurityarchitecture |