Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyberinfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment., , , , , , , , , and 2 other author(s). Clust. Comput., 10 (3): 301-310 (2007)Federated login to TeraGrid., , and . IDtrust, page 1-11. ACM, (2010)CyberInfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment., , , , , , , , , and 2 other author(s). CLADE, page 25-33. IEEE Computer Society, (2006)CILogon: A federated X.509 certification authority for cyberinfrastructure logon., , and . Concurr. Comput. Pract. Exp., 26 (13): 2225-2239 (2014)CILogon: a federated X.509 certification authority for cyberinfrastructure logon., , and . XSEDE, page 53:1-53:7. ACM, (2013)Single sign-on for java web start applications using myproxy., , and . SWS, page 95-102. ACM, (2006)Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory., , and . DependSys, page 119-126. IEEE, (2020)Observatory Middleware Framework., , , , , , and . eScience, page 366-367. IEEE Computer Society, (2008)Trusted CI Experiences in Cybersecurity and Service to Open Science., , , , , , , , , and 9 other author(s). PEARC, page 60. ACM, (2019)Towards A Taxonomy Of Attacks Against Energy Control Systems., , and . Critical Infrastructure Protection, volume 290 of IFIP Advances in Information and Communication Technology, page 71-85. Springer, (2008)