Grid Computing Security

Size: px
Start display at page:

Download "Grid Computing Security"

Transcription

1 Grid Computing Security

2 Anirban Chakrabarti Grid Computing Security With 87 Figures and 12 Tables 123

3 Anirban Chakrabarti Infosys Technologies Limited Electronic City Hosur Road Bangalore India Library of Congress Control Number: ACM Computing Classification (1998): C.2, D.4.6, K.6.5 ISBN Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com Springer-Verlag Berlin Heidelberg 2007 The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typeset by the author Production: Integra Software Services Pvt. Ltd., India Cover design: KünkelLopka Werbeagentur, Heidelberg Printed on acid-free paper 42/ Integra

4 Preface Grid computing is widely regarded as a technology of immense potential in both industry and academia. The evolution pattern of grid technologies is very similar to the growth and evolution of Internet technologies that was witnessed in the early 1990s. Similar to the Internet, the initial grid computing technologies were also developed mostly in the universities and research labs to solve unique research problems and to collaborate between different researchers across the globe. Recently, the high computing industries like finance, life sciences, energy, automobiles, rendering, etc. are showing a great amount of interest in the potential of connecting standalone and silo based clusters into a department and sometimes enterprisewide grid system. Grid computing is currently in the midst of evolving standards, inheriting and customizing from those developed in the high performance, distributed, and recently from the Web services community. Due to the lack of consistent and widely used standards, several enterprises are concerned about the implementation of an enterprise-level grid system, though the potential of such a system is well understood. Even when the enterprises have considered grid as a solution, several issues have made them reconsider their decisions. Issues related to application engineering, manageability, data management, licensing, security, etc. have prevented them from implementing an enterprise-wide grid solution. As a technology, grid computing has potential beyond the high performance computing industries due to it's inherent collaboration, autonomic, and utility based service behavior. To make this evolution possible all the above-mentioned issues need to be solved. Some of the issues are technical and some of them have business and economic overtones like the issue related to licensing. Each of the issues mentioned above is important and deserves a close look and understanding. In this book we will solely concentrate on the issue related to grid computing security. As an issue, security is perhaps the most important and needs close understanding as grid computing offers unique security challenges. In this book we look at different security issues pertaining to the grid system; some of them are of immediate concern and some are long term issues. We will also look at security issues in other areas of computer science like

5 vi Preface networks and operating systems which may affect the design of future grids. We have categorized the issues pertaining to grid computing security into three main buckets viz. architecture related issues, infrastructure related issues, and management related issues. Architecture related issues are concerned about the overall architecture of the grid system like the concerns pertaining to information security, concerns about user and resource authorization, and issues pertaining to the overall service offered by the grid system. The infrastructure related issues are concerned about the underlying infrastructure which includes the hosts or the machines, and the network infrastructure. In addition, several management systems need to be in place for an all pervasive enterprise level and secure grid system. There are three main types of management systems which are important from the grid perspective, namely the credential management systems, the trust management systems, and the monitoring systems. All the three issues mentioned above are dealt with in this book, along with existing solutions and potential concerns. Organization In this book we have made no assumption about the prerequisites for the readers. We have provided a short background on grid computing, security technologies, and Web service standards for readers who are new to this field. It is to be noted that the background is not extensive and enough references are provided for readers to have a fair understanding about the different background technologies. The book is organized into 13 chapters and an appendix. Chapter 1 looks at the background, benefits, and concerns pertaining to grid systems. Chapter 2 talks about the different security technologies that are available and useful to build a secure grid system. The different security technologies that are covered in this chapter are different authentication/encryption systems, identity protocols and popular technologies like Kerberos, HMAC, SSL/TLS, IPSec, among others. It is to be noted that Web services security standards, which form the backbone of grid security, are not dealt with in this chapter. They are separately listed in the appendix. Chapter 3 provides a taxonomy of the different grid security issues and solutions. We feel that the chapter is important because readers will get a snapshot of different issues, solutions, and concerns in one place and can refer to the detailed discussions in the subsequent chapters, if interested. After the brief overview and background about the different technologies, landscape, and taxonomy we discuss the different issues in detail in Chap. 4 to 11. In Chap. 4, we look at the information

6 Acknowledgments vii security aspects of the grid system. Here we look at the grid standards like GSI, and security implementations of popular grid standard Globus. In Chap. 5, we look at the authorization systems namely the Community Authorization Service (CAS), Virtual Organization Membership Service (VOMS), Akenti, PERMIS, among others. In Chap. 6, we look at the issues pertaining to the grid service viz. Denial-of-Service (DoS) attacks and Quality of Service (QoS) violation attacks. Different solutions and concerns are also discussed in this chapter. It is to be noted that since grid systems have relatively limited deployments, most of these attacks and solutions described in the chapter have been borrowed from the domain of the Internet. Many of these solutions would be useful in designing the future secure grid. Chapter 7 looks at the security issues pertaining to the hosts or the machines comprising the grid system. Different solutions like sandboxing, flexible kernels, virtualization, etc. have been discussed in detail in this chapter. Chapter 8 looks at another important infrastructure component namely the network. The immediate issues like integrating firewalls, VPNs, etc. are looked at in this chapter. In addition some long term issues like secure grid multicasting sensor grids, and others are also discussed in this chapter. Chapters 9-11 deal with the different management systems. Chapter 9 discusses about credential management systems like MyProxy, Smartcards, etc. and issues pertaining to them. Chapter 10 talks about trust management systems and issues like trust creation, negotiation among others. These issues are important in dynamic systems and have enormous research potential. Chapter 11 talks about the monitoring systems that are currently present. Two grid security case studies are provided in Chap. 12. These case studies should help readers in getting a holistic view of the different concepts, principles, protocols, and technologies mentioned in the book. Finally Chap. 13 concludes the book by looking at a few future technologies and mapping the issues and solutions into immediate, medium term and long term categories. Acknowledgments I would like to thank all those people who have contributed to the book. I would like to thank my colleagues, Dr Shubhashis Sengupta, Mr Deependra Moitra, Mr Srikanth Sundarrajan, and Mr Hariprasad Nellitheertha for helping me sort out the administrative issues, and providing me with useful comments and reviews. I would also like to thank Mr Anish Damodaran for providing me with useful inputs whenever needed. Moreover, I would take the opportunity to thank Mr Ralf Gestner and Ms Ulrike Stricker of

7 viii Preface Springer for providing me the opportunity and extending support in writing this book. I am also extremely grateful to all the reviewers for their insightful comments. Moreover, I would like to extend my gratitude to the Springer production and copyediting team for their tireless efforts. Finally, special thanks go to my wife Lopamudra and also to my mother for their constant support and encouragement.

8 Contents Preface..... v Organization..... vi Acknowledgments...vii 1 Introduction Background Grid Computing Overview Evolution of Grid Computing Benefits of Grid Computing Grid Computing Issues and Concerns About the Book Target Audience Organization of the Book Overview of Security Introduction Characteristics of Secure System Security Threats Different Encryption Schemes Different Authentication Schemes Shared Secret Based Authentication Public Key Based Authentication Third Party Authentication Schemes Different Integrity Schemes Message Authentication Code (MAC) Keyed MAC Standard Protocols Public Key Infrastructure Secure Socket Layer (SSL) Kerberos IP Security (IPSec) Chapter Summary...31

9 x Contents 3 Taxonomy of Grid Security Issues Introduction Grid Security Taxonomy Architecture Related Issues Information Security Authorization Service Security Infrastructure Related Issues Host Security Issues Network Security Issues Management Related Issues Credential Management Trust Management Monitoring Chapter Summary Grid Information Security Architecture Introduction Grid Security Infrastructure (GSI) Grid Security Model Authentication in GSI Certificate based Authentication Password based Authentication Integration with Kerberos Delegation in GSI An Example: Security in Globus Toolkit 4.0 (GT4) Message Protection in GT Delegation in GT Chapter Summary Grid Authorization Systems Introduction Different Access Control Models Push vs. Pull Authorizations Characteristics of Grid Authorization Systems Scalability Issues Security Issues Revocation Issues Inter-operability Issues Grid Authorization Systems...79

10 Contents xi 5.3 VO Level Authorization Systems Community Authorization Service (CAS) Virtual Organization Membership Service (VOMS) Enterprise Authorization and Licensing Service (EALS) Resource Level Authorization Systems Akenti Privilege and Role Management Infrastructure Standards Validation (PERMIS) Project Authorization Using GridMap Comparing the Different Authorization Systems Comparison Roadmap to Grid Authorization Systems Chapter Summary Service Level Security in Grid Systems Introduction Components of Service Service Vulnerabilities DoS Attacks and Countermeasures Effect of DoS attacks Distributed Denial-of-Service Attacks Existing DoS Countermeasures Preventive DoS Counter-measures Reactive DoS Countermeasures Comparison between DoS Countermeasures QoS Violation Attacks and Countermeasures Different Types of QoS Violation Attacks Existing Solutions Chapter Summary Host Level Security Introduction Data Protection Issue Application Level Sandboxing Virtualization Flexible Kernel Systems Sandboxing Job Starvation Issue Advanced Reservation Techniques Priority Reduction Techniques Chapter Summary...157

11 xii Contents 8 Grid Network Security Introduction Grid Network Security Issues Firewalls Different Types of Firewalls Firewalls and Grid Issues Firewalls and Web Services Virtual Private Networks (VPN) VPNs and Grid Types of VPNs VPNs and Grid Issues VPNs and Grid Some Solutions Secure Routing Impacts of Routing Table Poisoning Different Routing Protocols Routing Attacks and Countermeasures Multicasting Secure Multicasting Sensor Grids Security in Sensor Networks Issues Existing Solutions High Performance Interconnects Gigabit Ethernet Infiniband Architecture (IBA) Some High Performance Security Solutions Chapter Summary Grid Credential Management Systems Introduction Types of Credentials Characteristics of Credential Management Systems Different Credential Management System s Centralized Vs. Federated Credential Management Credential Repositories Smart Cards Virtual Smart Cards MyProxy Online Credential Repository Federated Credential Management Systems Virtualized Credential Manager (VCMan) KX Liberty Alliance for Federated Identity Shibboleth Identity Federation Chapter Summary...212

12 Contents xiii 10 Managing Trust in the Grid Introduction Definition of Trust Reputation and Trust Categories of Trust Functions Trust Management Systems Life Cycle of Trust Management Systems Characteristics of Trust Management Systems Reputation-Based Trust Management Systems PeerTrust A P2P Trust Management System XenoTrust Trust Management System NICE Trust Management System Secure Grid Outsourcing (SeGO) System Policy-Based Trust Management Systems PeerTrust Trust Negotiation TrustBuilder Trust Negotiation for the Grid Comparing the Trust Management Systems Generic Understanding of Trust Management Systems Applicability of the Trust Management Systems Chapter Summary Grid Monitoring Introduction Stages of Monitoring Requirements of Distributed Monitoring System Grid Monitoring Architecture (GMA) Different Monitoring Tools/Frameworks Simple Network Management Protocol (SNMP) Different System Monitoring Tools Ganglia Hawkeye Monitoring System Relational GMA (RGMA) Globus Monitoring and Discovery System (MDS) Management of Adaptive Grid Infrastructure (MAGI) GlueDomains Discussions on the Different Monitoring Systems Comparison Applicability Chapter Summary...269

13 xiv Contents 12 Putting it All Together Security in the European Data Grid (EDG) Authentication and Delegation Credential Management Job Execution An Enterprise Case Study Overview of the Security Architecture Chapter Summary Conclusion Looking at the Future Identity Based Encryption (IBE) Application Oriented Networking (AON) Summarizing the Security Issues in Grid Immediate Issues Medium-term Issues Long-term Issues Summarizing the Security Solutions in the Grid Solutions to Immediate Issues Solutions to Medium Term Issues Solutions to Long Term Issues Appendix A.1 Web Services A.1.1 Components of Web Services A.2 Web Services Security A.2.1 WS-Security A.2.2 WS-Policy* A.2.3 WS-SecureConversation A.2.4 Security Assertions Markup Language (SAML) A.2.5 extensible Access Control Markup Language A.3 Open Grid Services Architecture (OGSA) A.3.1 Open Grid Services Infrastructure (OGSI) A.3.2 Web Services Critique of OGSI A.3.2 Web Services Resource Framework (WSRF) Bibliography Index...329

Grid Computing Security

Grid Computing Security Anirban Chakrabarti Grid Computing Security With 87 Figures and 12 Tables Sprin g er Contents Preface Organization Acknowledgments v vi vii 1 Introduction 1 1.1 Background 1 1.2 Grid Computing Overview

More information

Julien Masanès. Web Archiving. With 28 Figures and 6 Tables ABC

Julien Masanès. Web Archiving. With 28 Figures and 6 Tables ABC Web Archiving Julien Masanès Web Archiving With 28 Figures and 6 Tables ABC Author Julien Masanès European Web Archive 25 rue des envierges 75020 Paris, France julien.masanes@bnf.fr ACM Computing Classification

More information

High Availability and Disaster Recovery

High Availability and Disaster Recovery High Availability and Disaster Recovery Klaus Schmidt High Availability and Disaster Recovery Concepts, Design, Implementation With 83 Figures and 26 Tables 123 Klaus Schmidt Stockheimer Str. 20 60385

More information

Advanced Data Mining Techniques

Advanced Data Mining Techniques Advanced Data Mining Techniques David L. Olson Dursun Delen Advanced Data Mining Techniques Dr. David L. Olson Department of Management Science University of Nebraska Lincoln, NE 68588-0491 USA dolson3@unl.edu

More information

Interfacing with C++

Interfacing with C++ Interfacing with C++ Jayantha Katupitiya Kim Bentley Interfacing with C++ Programming Real-World Applications ABC Dr. Jayantha Katupitiya Senior Lecturer School of Mechanical and Manufacturing Engineering

More information

Research on Industrial Security Theory

Research on Industrial Security Theory Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3

More information

Software Development for SAP R/3

Software Development for SAP R/3 Software Development for SAP R/3 Springer-Verlag Berlin Heidelberg GmbH Ulrich Mende Software Development for SAP R/3 Data Dictionary, ABAP/4, Interfaces With Diskette With 124 Figures and Many Example

More information

The Information Retrieval Series. Series Editor W. Bruce Croft

The Information Retrieval Series. Series Editor W. Bruce Croft The Information Retrieval Series Series Editor W. Bruce Croft Sándor Dominich The Modern Algebra of Information Retrieval 123 Sándor Dominich Computer Science Department University of Pannonia Egyetem

More information

Contributions to Economics

Contributions to Economics Contributions to Economics Kesra Nermend Vector Calculus in Regional Development Analysis Comparative Regional Analysis Using the Example of Poland Physica Verlag A Springer Company Dr. inž. Kesra Nermend

More information

Gengsheng Lawrence Zeng. Medical Image Reconstruction. A Conceptual Tutorial

Gengsheng Lawrence Zeng. Medical Image Reconstruction. A Conceptual Tutorial Gengsheng Lawrence Zeng Medical Image Reconstruction A Conceptual Tutorial Gengsheng Lawrence Zeng Medical Image Reconstruction A Conceptual Tutorial With 163 Figures Author Prof. Dr. Gengsheng Lawrence

More information

Jinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation

Jinkun Liu Xinhua Wang. Advanced Sliding Mode Control for Mechanical Systems. Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis and MATLAB Simulation Jinkun Liu Xinhua Wang Advanced Sliding Mode Control for Mechanical Systems Design, Analysis

More information

Symmetric Cryptographic Protocols

Symmetric Cryptographic Protocols Symmetric Cryptographic Protocols Mahalingam Ramkumar Symmetric Cryptographic Protocols 2123 Mahalingam Ramkumar Mississippi State University Mississippi State Mississippi USA ISBN 978-3-319-07583-9 ISBN

More information

SpringerBriefs in Computer Science

SpringerBriefs in Computer Science SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin (Sherman) Shen Borko Furht V.S. Subrahmanian Martial Hebert

More information

Inside Relational Databases with Examples in Access

Inside Relational Databases with Examples in Access Inside Relational Databases with Examples in Access Inside Relational Databases with Examples in Access Mark Whitehorn and Bill Marklyn 123 Mark Whitehorn Applied Computing Division, University of Dundee,

More information

Enabling Technologies for Wireless E-Business

Enabling Technologies for Wireless E-Business Enabling Technologies for Wireless E-Business Weidong Kou Yelena Yesha (Eds.) Enabling Technologies for Wireless E-Business With 141 Figures and 15 Tables ABC Editors Weidong Kou Chinese State Key Laboratory

More information

Guide to OSI and TCP/IP Models

Guide to OSI and TCP/IP Models SPRINGER BRIEFS IN COMPUTER SCIENCE Mohammed M. Alani Guide to OSI and TCP/IP Models SpringerBriefs in Computer Science Series editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi

More information

Geometric Modeling and Algebraic Geometry

Geometric Modeling and Algebraic Geometry Geometric Modeling and Algebraic Geometry Bert Jüttler Ragni Piene Editors Geometric Modeling and Algebraic Geometry 123 Bert Jüttler Institute of Applied Geometry Johannes Kepler University Altenberger

More information

Computer Science Workbench. Editor: Tosiyasu L. Kunii

Computer Science Workbench. Editor: Tosiyasu L. Kunii Computer Science Workbench Editor: Tosiyasu L. Kunii H. Kitagawa T.L. Kunii The U nnortnalized Relational Data Model F or Office Form Processor Design With 78 Figures Springer-Verlag Tokyo Berlin Heidelberg

More information

Real-Time Graphics Rendering Engine

Real-Time Graphics Rendering Engine Hujun Bao Wei Hua Real-Time Graphics Rendering Engine With 66 figures, 11 of them in color ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA ADVANCED TOPICS IN SCIENCE AND TECHNOLOGY IN CHINA Zhejiang

More information

George Grätzer. Practical L A TEX

George Grätzer. Practical L A TEX Practical L A TEX George Grätzer Practical L A TEX 123 George Grätzer Toronto, ON, Canada Additional material to this book can be downloaded from http://extras.springer.com ISBN 978-3-319-06424-6 ISBN

More information

Whitestein Series in software Agent Technologies. About whitestein Technologies

Whitestein Series in software Agent Technologies. About whitestein Technologies Whitestein Series in software Agent Technologies Series Editors: Marius Walliser Stefan Brantschen Monique Calisti Thomas Hempfling This series reports new developments in agent-based software technologies

More information

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003 Credential Management in the Grid Security Infrastructure GlobusWorld Security Workshop January 16, 2003 Jim Basney jbasney@ncsa.uiuc.edu http://www.ncsa.uiuc.edu/~jbasney/ Credential Management Enrollment:

More information

Scheduling in Distributed Computing Systems Analysis, Design & Models

Scheduling in Distributed Computing Systems Analysis, Design & Models Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) Scheduling in Distributed Computing Systems Analysis, Design & Models (A Research Monograph) by Deo Prakash

More information

Enabling Semantic Web Services

Enabling Semantic Web Services Enabling Semantic Web Services DieterFensel HolgerLausen AxelPolleres Jos de Bruijn Michael Stollberg Dumitru Roman John Domingue Enabling Semantic Web Services The Web Service Modeling Ontology With 41

More information

Authentication for Virtual Organizations: From Passwords to X509, Identity Federation and GridShib BRIITE Meeting Salk Institute, La Jolla CA.

Authentication for Virtual Organizations: From Passwords to X509, Identity Federation and GridShib BRIITE Meeting Salk Institute, La Jolla CA. Authentication for Virtual Organizations: From Passwords to X509, Identity Federation and GridShib BRIITE Meeting Salk Institute, La Jolla CA. November 3th, 2005 Von Welch vwelch@ncsa.uiuc.edu Outline

More information

COPYRIGHTED MATERIAL. Contents at a Glance

COPYRIGHTED MATERIAL. Contents at a Glance Contents at a Glance Introduction xxiii Chapter 1 Planning the Logical Architecture 1 Chapter 2 Designing the Physical Architecture 47 Chapter 3 Integrating SharePoint with the Network Infrastructure 127

More information

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Introduction This five-day instructor-led course provides students

More information

IBM Tivoli Federated Identity Manager Version Installation Guide GC

IBM Tivoli Federated Identity Manager Version Installation Guide GC IBM Tivoli Federated Identity Manager Version 6.2.2 Installation Guide GC27-2718-01 IBM Tivoli Federated Identity Manager Version 6.2.2 Installation Guide GC27-2718-01 Note Before using this information

More information

THEBES: THE GRID MIDDLEWARE PROJECT Project Overview, Status Report and Roadmap

THEBES: THE GRID MIDDLEWARE PROJECT Project Overview, Status Report and Roadmap THEBES: THE GRID MIDDLEWARE PROJECT Project Overview, Status Report and Roadmap Arnie Miles Georgetown University adm35@georgetown.edu http://thebes.arc.georgetown.edu The Thebes middleware project was

More information

Interfacing Operational Grid Security to Site Security. Eileen Berman Fermi National Accelerator Laboratory

Interfacing Operational Grid Security to Site Security. Eileen Berman Fermi National Accelerator Laboratory Interfacing Operational Grid Security to Site Security Eileen Berman Fermi National Accelerator Laboratory Introduction Computing systems at Fermilab belong to one of two large enclaves The General Computing

More information

GLOBUS TOOLKIT SECURITY

GLOBUS TOOLKIT SECURITY GLOBUS TOOLKIT SECURITY Plamen Alexandrov, ISI Masters Student Softwarepark Hagenberg, January 24, 2009 TABLE OF CONTENTS Introduction (3-5) Grid Security Infrastructure (6-15) Transport & Message-level

More information

30 Nov Dec Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy

30 Nov Dec Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy Why the Grid? Science is becoming increasingly digital and needs to deal with increasing amounts of

More information

Web Development with Java

Web Development with Java Web Development with Java Tim Downey Web Development with Java Using Hibernate, JSPs and Servlets Tim Downey, BS, MS Florida International University Miami, FL 33199, USA British Library Cataloguing in

More information

ITIL 2011 At a Glance. John O. Long

ITIL 2011 At a Glance. John O. Long ITIL 2011 At a Glance John O. Long SpringerBriefs in Computer Science Series Editors Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin Shen Borko Furht VS

More information

Mobile Phone Security and Forensics

Mobile Phone Security and Forensics Mobile Phone Security and Forensics Iosif I. Androulidakis Mobile Phone Security and Forensics A Practical Approach Second Edition Iosif I. Androulidakis Pedini Ioannina Greece ISBN 978-3-319-29741-5

More information

Failure-Modes-Based Software Reading

Failure-Modes-Based Software Reading SPRINGER BRIEFS IN COMPUTER SCIENCE Yang-Ming Zhu Failure-Modes-Based Software Reading SpringerBriefs in Computer Science More information about this series at http://www.springer.com/series/10028 Yang-Ming

More information

Grids and Security. Ian Neilson Grid Deployment Group CERN. TF-CSIRT London 27 Jan

Grids and Security. Ian Neilson Grid Deployment Group CERN. TF-CSIRT London 27 Jan Grids and Security Ian Neilson Grid Deployment Group CERN TF-CSIRT London 27 Jan 2004-1 TOC Background Grids Grid Projects Some Technical Aspects The three or four A s Some Operational Aspects Security

More information

Parallel Programming

Parallel Programming Parallel Programming Thomas Rauber Gudula Rünger Parallel Programming For Multicore and Cluster Systems 123 Thomas Rauber Universität Bayreuth Computer Science Department 95440 Bayreuth Germany rauber@uni-bayreuth.de

More information

"Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary

Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary MOC 6435 B Designing a Windows Network Infrastructure Course Summary Description This five-day course will provide students with an understanding of how to design a Windows Network Infrastructure that

More information

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7

More information

The SweGrid Accounting System

The SweGrid Accounting System The SweGrid Accounting System Enforcing Grid Resource Allocations Thomas Sandholm sandholm@pdc.kth.se 1 Outline Resource Sharing Dilemma Grid Research Trends Connecting National Computing Resources in

More information

The Architectural Logic of Database Systems

The Architectural Logic of Database Systems The Architectural Logic of Database Systems E. J. Yannakoudakis The Architectural Logic of Database Systems With 69 Figures Springer-Verlag london Berlin Heidelberg New York Paris Tokyo E. 1. Yannakoudakis,

More information

SLCS and VASH Service Interoperability of Shibboleth and glite

SLCS and VASH Service Interoperability of Shibboleth and glite SLCS and VASH Service Interoperability of Shibboleth and glite Christoph Witzig, SWITCH (witzig@switch.ch) www.eu-egee.org NREN Grid Workshop Nov 30th, 2007 - Malaga EGEE and glite are registered trademarks

More information

Philipp von Weitershausen. Web Component Development with Zope 3

Philipp von Weitershausen. Web Component Development with Zope 3 Philipp von Weitershausen Web Component Development with Zope 3 Philipp von Weitershausen Web Component Development with Zope 3 With 39 Figures and 10 Tables 123 Philipp von Weitershausen Goebenstraße

More information

Enabling Grids for E-sciencE. EGEE security pitch. Olle Mulmo. EGEE Chief Security Architect KTH, Sweden. INFSO-RI

Enabling Grids for E-sciencE. EGEE security pitch. Olle Mulmo. EGEE Chief Security Architect KTH, Sweden.  INFSO-RI EGEE security pitch Olle Mulmo EGEE Chief Security Architect KTH, Sweden www.eu-egee.org Project PR www.eu-egee.org EGEE EGEE is the largest Grid infrastructure project in the World? : 70 leading institutions

More information

"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary

Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary Description Course Summary The Cisco CCNA curriculum includes a third course, Interconnecting Cisco Networking Devices: Accelerated (CCNAX), consisting of Interconnecting Cisco Networking Devices, Part

More information

Implementing Cisco Network Security (IINS) 3.0

Implementing Cisco Network Security (IINS) 3.0 Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Computer Architecture

Computer Architecture Computer Architecture Springer-Verlag Berlin Heidelberg GmbH Silvia M. Mueller Wolfgang J. Paul Computer Architecture Complexity and Correctness With 214 Figures and 185 Tables Springer Silvia Melitta

More information

Deploying the TeraGrid PKI

Deploying the TeraGrid PKI Deploying the TeraGrid PKI Grid Forum Korea Winter Workshop December 1, 2003 Jim Basney Senior Research Scientist National Center for Supercomputing Applications University of Illinois jbasney@ncsa.uiuc.edu

More information

YUBIKEY AUTHENTICATION FOR CYBERARK PAS

YUBIKEY AUTHENTICATION FOR CYBERARK PAS YUBIKEY AUTHENTICATION FOR CYBERARK PAS Name of Company: Yubico Website: www.yubico.com Name of Product: YubiKey 4 / YubiKey NEO (C) 2016 CyberArk Software Limited. All rights Reserved. 1 YUBICO SOLUTION

More information

TABLE OF CONTENTS CHAPTER TITLE PAGE

TABLE OF CONTENTS CHAPTER TITLE PAGE vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION ACKNOWLEDGMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES ii iv v vi vii xiii xiv xvi 1 OVERVIEW 1 1.1 Introducation

More information

The Smart Grid Security Innovation Alliance. John Reynolds October 26, 2011 Cambridge, Massachusetts

The Smart Grid Security Innovation Alliance. John Reynolds October 26, 2011 Cambridge, Massachusetts The Smart Grid Security Innovation Alliance John Reynolds October 26, 2011 Cambridge, Massachusetts The SGSIA addresses the entire ecosystem. The Smart Grid Security Innovation Alliance is a working association

More information

Foundations of 3D Graphics Programming

Foundations of 3D Graphics Programming Foundations of 3D Graphics Programming Jim X. Chen Edward J. Wegman Foundations of 3D Graphics Programming Using JOGL and Java3D With 139 Figures Jim X. Chen, PhD Computer Science Department George Mason

More information

Lecture Notes in Mathematics Editors: J.--M. Morel, Cachan F. Takens, Groningen B. Teissier, Paris

Lecture Notes in Mathematics Editors: J.--M. Morel, Cachan F. Takens, Groningen B. Teissier, Paris Lecture Notes in Mathematics 1842 Editors: J.--M. Morel, Cachan F. Takens, Groningen B. Teissier, Paris 3 Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Trygve Johnsen Andreas Leopold Knutsen

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

Low Level X Window Programming

Low Level X Window Programming Low Level X Window Programming Ross J. Maloney Low Level X Window Programming An Introduction by Examples 123 Dr. Ross J. Maloney Yenolam Corporation Booragoon, WA Australia ISBN 978-3-319-74249-6 ISBN

More information

CS6703 GRID AND CLOUD COMPUTING. Question Bank Unit-I. Introduction

CS6703 GRID AND CLOUD COMPUTING. Question Bank Unit-I. Introduction CS6703 GRID AND CLOUD COMPUTING Question Bank Unit-I Introduction Part A 1. Define Grid Computing. 2. Define Cloud Computing. 3. Analyze the working of GPUs. 4. List out the cluster design. 5. Differentiate

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Security and Administrator s Guide for Web Services 11g Release 1 (11.1.1) B32511-01 May 2009 This document describes how to administer and secure Web services using Enterprise

More information

A VO-friendly, Community-based Authorization Framework

A VO-friendly, Community-based Authorization Framework A VO-friendly, Community-based Authorization Framework Part 1: Use Cases, Requirements, and Approach Ray Plante and Bruce Loftis NCSA Version 0.1 (February 11, 2005) Abstract The era of massive surveys

More information

Graphics Programming in c++

Graphics Programming in c++ Graphics Programming in c++ Springer London Berlin Heidelberg New York Barcelona Budapest Hong Kong Milan Paris Santa Clara Singapore Tokyo Mark Walmsley Graphics Programming in c++ Writing Graphics Applications

More information

Microsoft Core Solutions of Microsoft SharePoint Server 2013

Microsoft Core Solutions of Microsoft SharePoint Server 2013 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20331 - Core Solutions of Microsoft SharePoint Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This course will provide you with the

More information

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla

Windows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4

More information

An agent-based peer-to-peer grid computing architecture

An agent-based peer-to-peer grid computing architecture University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 An agent-based peer-to-peer grid computing architecture Jia

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Interoperability Guide for Oracle Web Services Manager 11g Release 1 (11.1.1) E16098-04 January 2011 This document describes how to implement the most common Oracle WSM interoperability

More information

Fundamentals of Operating Systems. Fifth Edition

Fundamentals of Operating Systems. Fifth Edition Fundamentals of Operating Systems Fifth Edition Fundamentals of Operating Systems A.M. Lister University of Queensland R. D. Eager University of Kent at Canterbury Fifth Edition Springer Science+Business

More information

Grid Computing. MCSN - N. Tonellotto - Distributed Enabling Platforms

Grid Computing. MCSN - N. Tonellotto - Distributed Enabling Platforms Grid Computing 1 Resource sharing Elements of Grid Computing - Computers, data, storage, sensors, networks, - Sharing always conditional: issues of trust, policy, negotiation, payment, Coordinated problem

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Administering Web Services 12c (12.1.2) E28131-01 June 2013 Documentation for developers and administrators that describes how to administer Web services. Oracle Fusion Middleware

More information

"Charting the Course... MOC B Active Directory Services with Windows Server Course Summary

Charting the Course... MOC B Active Directory Services with Windows Server Course Summary Description Course Summary Get Hands on instruction and practice administering Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2 in this 5-day Microsoft Official Course. You

More information

An authorization Framework for Grid Security using GT4

An authorization Framework for Grid Security using GT4 www.ijcsi.org 310 An authorization Framework for Grid Security using GT4 Debabrata Singh 1, Bhupendra Gupta 2,B.M.Acharya 3 4, Sarbeswar Hota S O A University, Bhubaneswar Abstract A Grid system is a Virtual

More information

Graph Data Model. and Its Data Language. Hideko S. Kunii. Foreword by Gio Wiederhold

Graph Data Model. and Its Data Language. Hideko S. Kunii. Foreword by Gio Wiederhold Hideko S. Kunii Graph Data Model and Its Data Language Foreword by Gio Wiederhold With 35 Figures Springer-Verlag Tokyo Berlin Heidelberg New York London Paris Hong Kong HIDEKO S. KUNII General Manager

More information

Business White Paper IDENTITY AND SECURITY. Access Manager. Novell. Comprehensive Access Management for the Enterprise

Business White Paper IDENTITY AND SECURITY.  Access Manager. Novell. Comprehensive Access Management for the Enterprise Business White Paper IDENTITY AND SECURITY Novell Access Manager Comprehensive Access Management for the Enterprise Simple, Secure Access to Network Resources Business Driver 1: Cost Novell Access Manager

More information

Formalization of Objectives of Grid Systems Resources Protection against Unauthorized Access

Formalization of Objectives of Grid Systems Resources Protection against Unauthorized Access Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 272-277 Formalization of Objectives of Grid Systems Resources Protection against Unauthorized Access M. O. Kalinin and A. S. Konoplev

More information

A Multipolicy Authorization Framework for Grid Security

A Multipolicy Authorization Framework for Grid Security A Multipolicy Authorization Framework for Grid Security Bo Lang,,2 Ian Foster,,3 Frank Siebenlist,,3 Rachana Ananthakrishnan, Tim Freeman,3 Mathematics and Computer Science Division, Argonne National Laboratory,

More information

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4

More information

SharePoint 2013 Central Administration

SharePoint 2013 Central Administration Course Objectives SharePoint 2013 Central Administration SharePoint Virtual environment creation through VMware, Virtual Box & Hyper-V. SharePoint Farm setup - Standalone, Small, Medium and Large Scale

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Thebes, WS SAML, and Federation

Thebes, WS SAML, and Federation Thebes, WS SAML, and Federation Internet2 Fall Member Meeting November 3, 2010 Thebes Consortium Georgetown University Arnie Miles adm35@georgetown.edu http://code.google.com/p/thebes/ Back story I haven't

More information

A Two-Fold Authentication Mechanism for Network Security

A Two-Fold Authentication Mechanism for Network Security Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1

More information

Grid Security: The Globus Perspective

Grid Security: The Globus Perspective Grid Security: The Globus Perspective GlobusWORLD 2005 Feb 7-11, Boston, MA Frank Siebenlist - ANL (franks@mcs.anl.gov) Von Welch - NCSA (welch@ncsa.uiuc.edu) http://www.globus.org/ Outline Part One: Von

More information

Robust SRAM Designs and Analysis

Robust SRAM Designs and Analysis Robust SRAM Designs and Analysis Jawar Singh Saraju P. Mohanty Dhiraj K. Pradhan Robust SRAM Designs and Analysis 123 Jawar Singh Indian Institute of Information Technology Design and Manufacturing Dumna

More information

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 z/tpf V1.1 TPF Users Group - Spring 2009 Security Considerations in a Service Oriented Architecture (SOA) Jason Keenaghan Main Tent AIM Enterprise Platform Software IBM z/transaction Processing Facility

More information

Token-based Payment in Dynamic SAML-based Federations

Token-based Payment in Dynamic SAML-based Federations Token-based Payment in Dynamic SAML-based Federations David J. Lutz 1 and Burkhard Stiller 2 1 Rechenzentrum Universitaet Stuttgart Allmandring 30; 70550 Stuttgart; Germany David.Lutz@rus.uni-stuttgart.de

More information

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification: Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,

More information

PERMIS An Application Independent Authorisation Infrastructure. David Chadwick

PERMIS An Application Independent Authorisation Infrastructure. David Chadwick PERMIS An Application Independent Authorisation Infrastructure David Chadwick Role/Attribute Based Access Control Model Hierarchical Role based Access Control (RBAC) Permissions are allocated to roles/attributes

More information

GSI Online Credential Retrieval Requirements. Jim Basney

GSI Online Credential Retrieval Requirements. Jim Basney GSI Online Credential Retrieval Requirements Jim Basney jbasney@ncsa.uiuc.edu http://www.ncsa.uiuc.edu/~jbasney/ Online Credential Retrieval Defined Client Server Authenticate Request Credential Verify

More information

Credentials Management for Authentication in a Grid-Based E-Learning Platform

Credentials Management for Authentication in a Grid-Based E-Learning Platform Credentials Management for Authentication in a Grid-Based E-Learning Platform Felicia Ionescu, Vlad Nae, Alexandru Gherega University Politehnica of Bucharest {fionescu, vnae, agherega}@tech.pub.ro Abstract

More information

Interoperability Solutions Guide for Oracle Web Services Manager 12c (12.2.1)

Interoperability Solutions Guide for Oracle Web Services Manager 12c (12.2.1) [1]Oracle Fusion Middleware Interoperability Solutions Guide for Oracle Web Services Manager 12c (12.2.1) E57783-01 October 2015 Documentation for software developers that describes how to implement the

More information

Globus Toolkit Firewall Requirements. Abstract

Globus Toolkit Firewall Requirements. Abstract Globus Toolkit Firewall Requirements v0.3 8/30/2002 Von Welch Software Architect, Globus Project welch@mcs.anl.gov Abstract This document provides requirements and guidance to firewall administrators at

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential

More information

Overview Brosix stringent corporate security requirements.

Overview Brosix stringent corporate security requirements. Brosix Security Data security is a high priority at Brosix, enabling us to con nue achieving the goal of providing efficient and secure online real me communica on services. Table of Contents Overview

More information

CIP Security Pull Model from the Implementation Standpoint

CIP Security Pull Model from the Implementation Standpoint CIP Security Pull Model from the Implementation Standpoint Jack Visoky Security Architect and Sr. Project Engineer Rockwell Automation Joakim Wiberg Team Manager Technology and Platforms HMS Industrial

More information

SAS Contextual Analysis 14.3: Administrator s Guide

SAS Contextual Analysis 14.3: Administrator s Guide SAS Contextual Analysis 14.3: Administrator s Guide SAS Documentation August 25, 2017 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2017. SAS Contextual Analysis

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Installing and Configuring Oracle SOA Suite and Oracle Business Process Management 12c (12.2.1) E57273-07 October 2016 Documentation for installers and system administrators that

More information

The Internet of Things

The Internet of Things The Internet of Things The Internet of Things Connecting Objects to the Web Edited by Hakima Chaouchi First published 2010 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.

More information

Federated Grids and their Security

Federated Grids and their Security Federated Grids and their Security Geoffrey Fox and Marlon Pierce Draft 0.4 Introduction We examine issues involved in creating virtual Grids out of specific Grid installations. We see it as inevitable

More information

Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada

Wireless Networks. Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada More information about this series at http://www.springer.com/series/14180 Sachin Shetty Xuebiao Yuchi

More information

20331B: Core Solutions of Microsoft SharePoint Server 2013

20331B: Core Solutions of Microsoft SharePoint Server 2013 20331B: Core Solutions of Microsoft SharePoint Server 2013 Course Details Course Code: Duration: Notes: 20331B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Oracle Fusion Middleware Installing and Configuring Oracle SOA Suite and Oracle Business Process Management. 12c ( )

Oracle Fusion Middleware Installing and Configuring Oracle SOA Suite and Oracle Business Process Management. 12c ( ) Oracle Fusion Middleware Installing and Configuring Oracle SOA Suite and Oracle Business Process Management 12c (12.2.1.3.0) E95730-01 May 2018 Oracle Fusion Middleware Installing and Configuring Oracle

More information

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic

More information

Enterprise Networks and Telephony

Enterprise Networks and Telephony Enterprise Networks and Telephony Springer London Berlin Heidelberg New York Barcelona Hong Kong Milan Paris Santa Clara Singapore Tokyo Solange Ghernaouti-Helie and Arnaud Dufour Enterprise Networks and

More information