Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osafoh-Kantanka Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information Security Officer IBM Security Strategy Intelligence, Big data analysis concepts and references Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai Abdelilah Essiari Willie Chin Introduction to distributed security concepts and public key infrastructure mary thompson Open Science Grid security-atlas-t2 Bob Cowles Security Open Science Grid Doug Olson Open Science Group Security Kevin Hill Xrootd proxies Andrew Hanushevsky Privilege Project Vikram Andem