Show simple item record

dc.contributor.author Basney, Jim
dc.contributor.author Candadai, Jayashree Ajay
dc.contributor.author Fleury, Terry
dc.contributor.author Gossman, Patrick
dc.contributor.author Gregorowicz, Mike
dc.contributor.author Koranda, Scott
dc.contributor.author McKee, Shawn
dc.contributor.author Meekhof, Ben
dc.contributor.author Kissel, Ezra
dc.date.accessioned 2017-04-11T17:02:03Z
dc.date.available 2017-04-11T17:02:03Z
dc.date.issued 2017-03-31
dc.identifier.uri http://hdl.handle.net/2022/21307
dc.description.abstract The 2016-2017 CTSC-OSiRIS collaborative design review of OSiRIS Access Assertions produced a set of security recommendations documented in this report that the OSiRIS project plans to implement in its deployed cyberinfrastructure. CTSC identified no significant weaknesses in its review of the initial design of the OSiRIS access control system. en
dc.description.sponsorship CTSC OAA en
dc.language.iso en en
dc.rights By exercising the Licensed Rights (defined below), You accept and agree to be bound by the terms and conditions of this Creative Commons Attribution-NoDerivatives 4.0 International Public License ("Public License"). To the extent this Public License may be interpreted as a contract, You are granted the Licensed Rights in consideration of Your acceptance of these terms and conditions, and the Licensor grants You such rights in consideration of benefits the Licensor receives from making the Licensed Material available under these terms and conditions. en
dc.rights.uri https://creativecommons.org/licenses/by-nd/4.0/ en
dc.subject CTSC en
dc.subject OSiRIS en
dc.subject Threat Model en
dc.subject Cyberinfrastructure en
dc.subject Access Control System en
dc.title CTSC-OSiRIS Collaborative Design Review of OSiRIS Access Assertions: Using the OAuth 2.0 Threat Model (RFC 6819) en
dc.type Technical Report en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IUScholarWorks


Advanced Search

Browse

My Account

Statistics