In this paper, we discuss the recent ESG’s development and implementation efforts concerning its authentication infrastructure. ESG’s requirements are to make the user’s log...
Frank Siebenlist, Rachana Ananthakrishnan, David E...
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
-- In Grid collaborations, scientists use middleware to execute computational experiments, visualize results, and securely share data on resources ranging from desktop machines to ...
Weide Zhang, David Del Vecchio, Glenn S. Wasson, M...
We describe the design and field evaluation of the Serendipitous Family Stories system, a web and mobile service that allows for videos to be saved in user-specified real-world lo...
Frank R. Bentley, Santosh Basapur, Sujoy Kumar Cho...
Scholarly entities, such as articles, journals, authors and institutions, are now mostly ranked according to expert opinion and citation data. The Andrew W. Mellon Foundation fund...
Johan Bollen, Marko A. Rodriguez, Herbert Van de S...