publication . Report . Other literature type . External research report . 2018

Guidelines for Secure Operation of Attribute Authorities and other issuers of access-granting statements

Groep, David L.; Kelsey, David; Short, Hannah; Sallé, Mischa; Stevanovic, Uros; Paetow, Stefan; Kremers, Maarten;
Open Access English
  • Published: 12 Nov 2018
  • Publisher: Karlsruhe
  • Country: Germany
Abstract
These guidelines describe the minimum requirements and recommendations for the secure operation of Attribute Authorities and similar services providing statements for the purpose of obtaining access to infrastructure services. Stated compliance with these guidelines may help to establish trust between issuers and Relying Parties. This document does not define an accreditation process.
Subjects
free text keywords: Security, AAI, Federated Identity Management, Security, AAI, Federated Identity Management, DATA processing & computer science, IGTF, AAOPS, AARC, IGTF, AAOPS, AARC, ddc:004
Related Organizations
Funded by
EC| AARC2
Project
AARC2
Authentication and Authorisation For Research and Collaboration
  • Funder: European Commission (EC)
  • Project Code: 730941
  • Funding stream: H2020 | RIA
Communities
EGI FederationEGI Projects: AARC2
Agricultural and Food SciencesAGINFRA+ Projects: Authentication and Authorisation for Research and Collaboration
Instruct-ERICInstruct-ERIC Projects: Authentication and Authorisation For Research and Collaboration
Download fromView all 4 versions
Open Access
Zenodo
Other literature type . 2018
Provider: Datacite
Open Access
ZENODO
External research report . 2018
Provider: ZENODO
Open Access
Zenodo
Other literature type . 2018
Provider: Datacite
Open Access
KITopen
Report . 2018
Provider: KITopen
Any information missing or wrong?Report an Issue