Cargando…

Securing Distributed Research

<!--HTML-->Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital...

Descripción completa

Detalles Bibliográficos
Autor principal: Short, Hannah
Lenguaje:eng
Publicado: 2018
Materias:
Acceso en línea:http://cds.cern.ch/record/2307452
_version_ 1780957638911066112
author Short, Hannah
author_facet Short, Hannah
author_sort Short, Hannah
collection CERN
description <!--HTML-->Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.
id cern-2307452
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2018
record_format invenio
spelling cern-23074522022-11-02T22:32:28Zhttp://cds.cern.ch/record/2307452engShort, HannahSecuring Distributed ResearchInverted CERN School of Computing 2018Inverted CSC<!--HTML-->Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.oai:cds.cern.ch:23074522018
spellingShingle Inverted CSC
Short, Hannah
Securing Distributed Research
title Securing Distributed Research
title_full Securing Distributed Research
title_fullStr Securing Distributed Research
title_full_unstemmed Securing Distributed Research
title_short Securing Distributed Research
title_sort securing distributed research
topic Inverted CSC
url http://cds.cern.ch/record/2307452
work_keys_str_mv AT shorthannah securingdistributedresearch
AT shorthannah invertedcernschoolofcomputing2018