Show simple item record Basney, Jim Candadai, Jayashree Ajay Fleury, Terry Gossman, Patrick Gregorowicz, Mike Koranda, Scott McKee, Shawn Meekhof, Ben Kissel, Ezra 2017-04-11T17:02:03Z 2017-04-11T17:02:03Z 2017-03-31
dc.description.abstract The 2016-2017 CTSC-OSiRIS collaborative design review of OSiRIS Access Assertions produced a set of security recommendations documented in this report that the OSiRIS project plans to implement in its deployed cyberinfrastructure. CTSC identified no significant weaknesses in its review of the initial design of the OSiRIS access control system. en
dc.description.sponsorship CTSC OAA en
dc.language.iso en en
dc.rights By exercising the Licensed Rights (defined below), You accept and agree to be bound by the terms and conditions of this Creative Commons Attribution-NoDerivatives 4.0 International Public License ("Public License"). To the extent this Public License may be interpreted as a contract, You are granted the Licensed Rights in consideration of Your acceptance of these terms and conditions, and the Licensor grants You such rights in consideration of benefits the Licensor receives from making the Licensed Material available under these terms and conditions. en
dc.rights.uri en
dc.subject CTSC en
dc.subject OSiRIS en
dc.subject Threat Model en
dc.subject Cyberinfrastructure en
dc.subject Access Control System en
dc.title CTSC-OSiRIS Collaborative Design Review of OSiRIS Access Assertions: Using the OAuth 2.0 Threat Model (RFC 6819) en
dc.type Technical Report en

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IUScholarWorks

Advanced Search


My Account