Open Access
EPJ Web Conf.
Volume 245, 2020
24th International Conference on Computing in High Energy and Nuclear Physics (CHEP 2019)
Article Number 03021
Number of page(s) 7
Section 3 - Middleware and Distributed Computing
Published online 16 November 2020
  1. OpenID Foundation, The OpenID Connect identity layer (2018), [Google Scholar]
  2. D. Hardt, RFC 6749, IETF Tools (2012), [Google Scholar]
  3. M.B. Jones, J. Bradley, N. Sakimura, RFC 7519, IETF Tools (2015), [Google Scholar]
  4. A. Ceccanti, E. Vianello, M. Caberletti, F. Giacomini, EPJ Web Conf. 214, 09002 (2019) [Google Scholar]
  5. The WLCG Authorization Working Group, [Google Scholar]
  6. B. Bockelman, A. Ceccanti, I. Collier, L. Cornwall, T. Dack, J. Guenther, M. Lassnig, M. Litmaath, P. Millar, M. Sallé et al., WLCG Authorisation from X.509 to Tokens, submitted for publication to this journal [Google Scholar]
  7. V. Ciaschini, V. Venturi, A. Ceccanti, The Virtual Organisation Membership Service, (2016) [Google Scholar]
  8. I.D. Collaboration, :, D. Salomoni, I. Campos, L. Gaido, J.M. de Lucas, P. Solagna, J. Gomes, L. Matyska, P. Fuhrman et al., INDIGO-DataCloud:A data and computing platform to facilitate seamless access to e-infrastructures (2017), arXiv:1711.01981 [Google Scholar]
  9. The EOSC-Hub project, [Google Scholar]
  10. The ESCAPE project, [Google Scholar]
  11. D. Crooks, D. Kelsey, I. Neilson, I. Collier, Building an IRIS trust framework, submitted for publication to this journal [Google Scholar]
  12. W. Denniss, J. Bradley, M. Jones, H. Tschofenig, OAuth 2.0 Device Authorization Grant, RFC 8628 (2019), [Google Scholar]
  13. M. Jones, A. Nadalin, B. Campbell, J. Bradley, C. Mortimore, OAuth 2.0 Token Exchange, RFC 8693 (2020), [Google Scholar]
  14. The System for Cross Domain Identity Management website, [Google Scholar]
  15. A. Ceccanti, M. Hardt, B. Wegh, A.P. Millar, M. Caberletti, E. Vianello, S. Licehammer, Journal of Physics: Conference Series 898 (2017) [CrossRef] [Google Scholar]
  16. A. Ceccanti, E. Vianello, M. Caberletti, INDIGO Identity and Access Management (IAM), [Google Scholar]
  17. A. Ceccanti, The VOMS administration service, [Google Scholar]
  18. The Let’s Encrypt Certificate Authority, [Google Scholar]
  19. The Spring Boot project, [Google Scholar]
  20. The VOMS Java APIs, [Google Scholar]
  21. The RCAuth online CA, [Google Scholar]
  22. OAuth for MyProxy, [Google Scholar]
  23. A. Ceccanti, V. Ciaschini, M. Dimou, G. Garzoglio, T. Levshina, S. Traylen, V. Venturi, VOMS/VOMRS utilization patterns and convergence plan, in Journal of Physics: Conference Series (2010), Vol. 219, [CrossRef] [Google Scholar]
  24. The CERN HR DB API service, [Google Scholar]
  25. M. Altunay, B. Bockelman, A. Ceccanti, L. Cornwall, M. Crawford, D. Crooks, T. Dack, D. Dykstra, D. Groep, I. Igoumenos et al., WLCG Common JWT Profiles (2019), [Google Scholar]
  26. E. Ormancey, Journal of Physics: Conference Series 119, 082008 (2008) [CrossRef] [Google Scholar]
  27. The WLCG DOMA Third-party Copy Working Group, [Google Scholar]
  28. The Keycloak Identity and Access Management service, [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.