Cargando…

EMI Security Architecture

This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed...

Descripción completa

Detalles Bibliográficos
Autores principales: White, J., Mikkonen, H., Schuller, B., Qiang, W., Groep, D., Koeroo, O., Salle, M., Sustr, Z., Kouril, D., Millar, P., Benedyczak, K., Ceccanti, A., Leinen, S., Tschopp, V., Fuhrmann, P., Heyman, E., Konstantinov, A.
Lenguaje:eng
Publicado: 2013
Acceso en línea:https://dx.doi.org/10.5281/ZENODO.5959
http://cds.cern.ch/record/1543541
_version_ 1780929998528446464
author White, J.
Mikkonen, H.
Schuller, B.
Qiang, W.
Groep, D.
Koeroo, O.
Salle, M.
Sustr, Z.
Kouril, D.
Millar, P.
Benedyczak, K.
Ceccanti, A.
Leinen, S.
Tschopp, V.
Fuhrmann, P.
Heyman, E.
Konstantinov, A.
author_facet White, J.
Mikkonen, H.
Schuller, B.
Qiang, W.
Groep, D.
Koeroo, O.
Salle, M.
Sustr, Z.
Kouril, D.
Millar, P.
Benedyczak, K.
Ceccanti, A.
Leinen, S.
Tschopp, V.
Fuhrmann, P.
Heyman, E.
Konstantinov, A.
author_sort White, J.
collection CERN
description This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.
id cern-1543541
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2013
record_format invenio
spelling cern-15435412022-01-13T20:45:52Zdoi:10.5281/ZENODO.5959http://cds.cern.ch/record/1543541engWhite, J.Mikkonen, H.Schuller, B.Qiang, W.Groep, D.Koeroo, O.Salle, M.Sustr, Z.Kouril, D.Millar, P.Benedyczak, K.Ceccanti, A.Leinen, S.Tschopp, V.Fuhrmann, P.Heyman, E.Konstantinov, A.EMI Security ArchitectureThis document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.EMI-JRA1-TD016oai:cds.cern.ch:15435412013
spellingShingle White, J.
Mikkonen, H.
Schuller, B.
Qiang, W.
Groep, D.
Koeroo, O.
Salle, M.
Sustr, Z.
Kouril, D.
Millar, P.
Benedyczak, K.
Ceccanti, A.
Leinen, S.
Tschopp, V.
Fuhrmann, P.
Heyman, E.
Konstantinov, A.
EMI Security Architecture
title EMI Security Architecture
title_full EMI Security Architecture
title_fullStr EMI Security Architecture
title_full_unstemmed EMI Security Architecture
title_short EMI Security Architecture
title_sort emi security architecture
url https://dx.doi.org/10.5281/ZENODO.5959
http://cds.cern.ch/record/1543541
work_keys_str_mv AT whitej emisecurityarchitecture
AT mikkonenh emisecurityarchitecture
AT schullerb emisecurityarchitecture
AT qiangw emisecurityarchitecture
AT groepd emisecurityarchitecture
AT koerooo emisecurityarchitecture
AT sallem emisecurityarchitecture
AT sustrz emisecurityarchitecture
AT kourild emisecurityarchitecture
AT millarp emisecurityarchitecture
AT benedyczakk emisecurityarchitecture
AT ceccantia emisecurityarchitecture
AT leinens emisecurityarchitecture
AT tschoppv emisecurityarchitecture
AT fuhrmannp emisecurityarchitecture
AT heymane emisecurityarchitecture
AT konstantinova emisecurityarchitecture