Show simple item record

dc.contributor.author Heiland, Randy
dc.contributor.author Koranda, Scott
dc.contributor.author Welch, Von
dc.date.accessioned 2013-05-08T13:56:16Z
dc.date.available 2013-05-08T13:56:16Z
dc.date.issued 2013-05
dc.identifier.uri http://hdl.handle.net/2022/15562
dc.description.sponsorship This document is a product of the Center for Trustworthy Scientific Cyberinfrastructure (CTSC). CTSC is supported by the National Science Foundation under Grant Number OCI-1234408. For more information about the Center for Trustworthy Scientific Cyberinfrastructure please visit: http://trustedci.org/. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. en_US
dc.language.iso en_US en_US
dc.rights This work is made available under the terms of the Creative Commons Attribution 3.0 Unported License. en_US
dc.rights.uri http://creativecommons.org/licenses/by/3.0/deed.en_US en_US
dc.subject cybersecurity, identity management en_US
dc.title Pegasus-CTSC Engagement Final Report en_US
dc.type Technical Report en_US
dc.altmetrics.display true en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

This work is made available under the terms of the Creative Commons Attribution 3.0 Unported License. This work is made available under the terms of the Creative Commons Attribution 3.0 Unported License.

Search IUScholarWorks


Advanced Search

Browse

My Account

Statistics