Cargando…
Securing Distributed Research
<!--HTML-->Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
2018
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2307452 |
_version_ | 1780957638911066112 |
---|---|
author | Short, Hannah |
author_facet | Short, Hannah |
author_sort | Short, Hannah |
collection | CERN |
description | <!--HTML-->Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained?
We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC. |
id | cern-2307452 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2018 |
record_format | invenio |
spelling | cern-23074522022-11-02T22:32:28Zhttp://cds.cern.ch/record/2307452engShort, HannahSecuring Distributed ResearchInverted CERN School of Computing 2018Inverted CSC<!--HTML-->Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.oai:cds.cern.ch:23074522018 |
spellingShingle | Inverted CSC Short, Hannah Securing Distributed Research |
title | Securing Distributed Research |
title_full | Securing Distributed Research |
title_fullStr | Securing Distributed Research |
title_full_unstemmed | Securing Distributed Research |
title_short | Securing Distributed Research |
title_sort | securing distributed research |
topic | Inverted CSC |
url | http://cds.cern.ch/record/2307452 |
work_keys_str_mv | AT shorthannah securingdistributedresearch AT shorthannah invertedcernschoolofcomputing2018 |