We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
A number of applications that use GIS for decision support can potentially be enhanced by the use of high-performance computers, broadband networks and mass data stores. We descri...
Paul D. Coddington, Kenneth A. Hawick, Heath A. Ja...
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...