Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Proxy Restrictions for Grid Usage

    The scale and power of Grid infrastructures makes them an inviting target for attack. Even if the Grid software is secure the Grid infrastructure is vulnerable via operating system vulnerabilities and misconfi...

    Joni Hahkala, John White, Ákos Frohner in Advances in Grid and Pervasive Computing (2009)

  2. No Access

    Article

    A Secure Grid Medical Data Manager Interfaced to the gLite Middleware

    The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures are promising for dealing with ...

    Johan Montagnat, Ákos Frohner, Daniel Jouvenot in Journal of Grid Computing (2008)

  3. No Access

    Article

    Authentication and Authorization Mechanisms for Multi-Domain Grid Environments

    This article discusses the authentication and the authorization aspects of security in grid environments spanning multiple administrative domains. Achievements in these areas are presented using the EU DataGri...

    Linda A. Cornwall, Jens Jensen, David P. Kelsey, Ákos Frohner in Journal of Grid Computing (2004)

  4. No Access

    Book and Conference Proceedings

    Object-Oriented Technology

    ECOOP 2001 Workshop Reader: ECOOP 2001 Workshops, Panel, and Posters Budapest, Hungary, June 18–22, 2001 Proceedings

    Ákos Frohner in Lecture Notes in Computer Science (2002)