1 |
\contentsline {chapter}{\numberline {1}Grid authentication mechanisms}{5} |
2 |
\contentsline {section}{\numberline {1.1}Authentication \& Authorization}{5} |
3 |
\contentsline {section}{\numberline {1.2}Evolution of authorization mechanisms}{5} |
4 |
\contentsline {subsection}{\numberline {1.2.1}ADAM}{5} |
5 |
\contentsline {subsection}{\numberline {1.2.2}LCAS}{5} |
6 |
\contentsline {subsection}{\numberline {1.2.3}LCMAPS}{5} |
7 |
\contentsline {subsection}{\numberline {1.2.4}VOMS}{5} |
8 |
\contentsline {section}{\numberline {1.3}Plug-ins}{5} |
9 |
\contentsline {section}{\numberline {1.4}API's}{5} |
10 |
\contentsline {chapter}{\numberline {2}The next generation}{6} |
11 |
\contentsline {section}{\numberline {2.1}AOS}{6} |
12 |
\contentsline {section}{\numberline {2.2}Tools}{6} |