Open Access
Issue
EPJ Web Conf.
Volume 214, 2019
23rd International Conference on Computing in High Energy and Nuclear Physics (CHEP 2018)
Article Number 03041
Number of page(s) 8
Section T3 - Distributed computing
DOI https://doi.org/10.1051/epjconf/201921403041
Published online 17 September 2019
  1. WISE Steering Committee, WISE Community Homepage (2018), https://wise-community.org [Google Scholar]
  2. WISE Steering Committee, WISE Community Wiki (2018), https://wiki.geant.org/display/WISE [Google Scholar]
  3. SURF, Cyber Threat Assessment 2017, Education and Research Sectors (2018), https://www.surf.nl/binaries/content/assets/surf/en/knowledgebase/2017/surf_cyberthreatassessment_2017.pdf [Google Scholar]
  4. Y. Legré, European Open Science Cloud EOSC: a vision of the future (2018), https://doi.org/10.5281/zenodo.1165664 [Google Scholar]
  5. D. Kelsey, K. Chadwick, I. Gaines, D. Groep, U. Kaila, C. Kanellopoulos, J. Marsteller, R. Niederberger, V. Ribaillier, R. Wartel et al., A Trust Framework for Security Collaboration among Infrastructures (2014), https://doi.org/10.22323/1.179.0011 [Google Scholar]
  6. AARC NA3, Snctfi and Sirtfi Frameworks (2017), https://aarc-project.eu/policies/ [Google Scholar]
  7. H. Short, R. Wartel, Building Security and Trust in Inter-Federation (2016), https://doi.org/10.22323/1.270.0030 [Google Scholar]
  8. C.J. Atherton, T. Barton, J. Basney, D. Broeder, A. Costa, M. van Daalen, S. Dyke, W. Elbers, C.F. Enell, E.M.V. Fasanelli et al., Federated Identity Management for Research Collaborations (2018), https://doi.org/10.5281/zenodo.1307551 [Google Scholar]
  9. David Crooks, Operational security, threat intelligence & distributed computing: the WLCG Security Operations Center Working Group (2018), https://indico.cern.ch/event/587955/contributions/2937420/ [Google Scholar]
  10. E. Dart, L. Rotman, B. Tierney, M. Hester, J. Zurawski, The Science DMZ: A Network Design Pattern for Data-intensive Science, in Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis (ACM, New York, NY, USA, 2013), SC ’13, pp. 85:1–85:10, ISBN 978-1-4503-2378-9, http://doi.acm.org/10.1145/2503210.2503245 [Google Scholar]
  11. HEP Software Foundation, including, J. Albrecht, A.A. Alves, Jr, G. Amadio, G. An-dronico, N. Anh-Ky, L. Aphecetche, J. Apostolakis, M. Asai, et al., A Roadmap for HEP Software and Computing R&D for the 2020s (2017), https://arxiv.org/abs/1712.06982 [Google Scholar]
  12. Andrea Ceccanti, Beyond X.509: Token-based Authentication and Authorization for HEP (2018), https://indico.cern.ch/event/587955/contributions/3012583/ [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.