CTSC-OSiRIS Collaborative Design Review of OSiRIS Access Assertions: Using the OAuth 2.0 Threat Model (RFC 6819)

Loading...
Thumbnail Image
If you need an accessible version of this item, please email your request to iusw@iu.edu so that they may create one and provide it to you.
Date
2017-03-31
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
The 2016-2017 CTSC-OSiRIS collaborative design review of OSiRIS Access Assertions produced a set of security recommendations documented in this report that the OSiRIS project plans to implement in its deployed cyberinfrastructure. CTSC identified no significant weaknesses in its review of the initial design of the OSiRIS access control system.
Description
Keywords
CTSC, OSiRIS, Threat Model, Cyberinfrastructure, Access Control System
Citation
DOI
Link(s) to data and video for this item
Relation
Rights
By exercising the Licensed Rights (defined below), You accept and agree to be bound by the terms and conditions of this Creative Commons Attribution-NoDerivatives 4.0 International Public License ("Public License"). To the extent this Public License may be interpreted as a contract, You are granted the Licensed Rights in consideration of Your acceptance of these terms and conditions, and the Licensor grants You such rights in consideration of benefits the Licensor receives from making the Licensed Material available under these terms and conditions.
Type
Technical Report