gset: Trust Management and Secure Accounting for Business in the Grid

Size: px
Start display at page:

Download "gset: Trust Management and Secure Accounting for Business in the Grid"

Transcription

1 gset: Trust Management and Secure Accounting for Business in the Grid Thomas Weishäupl, Christoph Witzany, Erich Schikuta Research Lab for Computational Technologies & Applications, University of Vienna Rathausstraße 19/9, 1010 Vienna, Austria Abstract We developed gset as solution for the unsolved problems in the field of dynamic trust management and secure accounting in commercial virtual organizations. gset establishes trust and privacy between entities in a Grid environment by adapting the concept of Secure Electronic Transactions (SET) used for electronic credit card transfers in ebusiness. Trust is necessary for Grid participants in a business environment. It is also necessary to support the dynamic manner of real markets. As distinguished function, in opposite to existing mechanisms as GSI/CAS/VOMS, gset allows the user to obtain access to a service without disclosing his credentials to the service provider. This minimizes the service provider s administrative effort needed for user account management. gset consists of Grid Services implemented with WSRF/GT4. gset is an enabling step to make Grids a platform for commercial workflows. 1 Introduction Trust and security are often claimed in Grid computing as one of the functional differences to earlier developments in the Web and distributed computing [6]. Beyond organizational boundaries, virtual organizations need a trustable and secure infrastructure to utilize autonomic resources and services. Security describes a field of activities to guarantee the privacy, integrity and availability of resources [5, chap.7]. For a commercial promotion and provision of services it is necessary to provide secure accounting mechanisms, which guarantee the credit-worthiness of the requester and the privacy of the requester. The authorization to a service would only be granted to a requester by a provider, if the provider trusts in the service requester credit-worthiness. Furthermore, the service requester would only access a service, if it is guaranteed that its private data (e.g. payment 1 The work described in this paper was supported by project number of the OeNB Anniversary Fund. data, accounting data, credit card number, etc.) can not be abused by the service provider. The two key requirements are dynamic authorization (trust management) and privacy for the requesters accounting data. These requirements need to be fulfilled in order to establish advanced trust for both participants, which are the service requesters and the service provider. Trust is related to confidence. Trust is a human attitude and results from experience and moral certainty [7]. Morality describes the attitude of a person. The confidence can be established also by the experience of a trusted third party. The trust and credential management in a commercial context has to handle hidden (covered), but trustable information. A business partner should not know all private information from a partner, as credit rating or payment details (credit card numbers), but he needs to trust in them for accepting a business. Secure Electronic Transaction (SET) [14, 15, 16] was developed for this concern. The dual signature is the key mechanism inside SET. gset [22] adapts the concept of SET and the dual signature for virtual organizations (Grids). Trust management in a commercial, business environment e.g. for ASPs needs to manage confident service requester information, as accounting data and resource usage data. Existing trust management solutions, like the ones discussed in the related work section below, do not fulfill the two key requirements for trust and requester privacy. There are no already existing solutions yet, and even combining available methods provides no satisfying remedy for this concern. The paper is structured in the following sections. First, we describe the related work for trust management and accounting and underline the differences to gset. Section 3 explains the concept of SET with the dual signature mechanism. We specify in detail the gset architecture and workflow in Section 4. Section 5 focuses on the implementation of gset with WSRF/GT4. Finally, Section 6 presents a gset enabled storage service as gset use case and discusses the performance and functional impacts.

2 2 Related work There are already different approaches for the management of trust, policy, and authorization in Grids. A good overview is given by [10, V.]. The privacy for accounting and payment is commonly an open issue. As already mentioned, basic security services in Grids are provided by PKI. The quality of PKIs highly depend on the management of the certificates and the education of the users. Certification authorities (CAs) need to verify the identity of all participants (users and resources, services). Many bureaucratic and technical challenges are related to issuing a certificate (photo ID of users, etc.). The organizational effort is high. By PKI a strong authentication mechanism is provided. Nevertheless, the authorization of users, the insight of who performs which actions to specific services is not solved by the user s authentication alone. Dynamic, ad-hoc authorizations are not possible. A first approach to manage authorization assertions was done by GSI with gridmap files. It utilizes directly the user certificate identifiers and maps them to local user accounts. The scalability of the gridmap file approach is limited. The account administration (trust management) to authorize users is a hard task to the involved participants. The trust management by gset provides account management without organizational overhead for the service provider. Community Authorization Service (CAS) [8] allows to express policies regarding resources distributed across a number of sites. Similar, the Virtual Organization Membership Service (VOMS) [21] also gives the capability to provide authorization information by a secure server that the local site has chosen to trust. In opposite to gset, CAS and VOMS do not give the capability for interchanging anonymous trustable data and do not offer dynamic account management. The three different services have no dependencies among each other. At GGF13, OGSA-WG [13, p.18] underlined that no real solution for VO management exists. OASIS WS-Security provides encryption and signing mechanism, which are partially used by gset. WS-Trust and WS-Federation provide methods for issuing, renewing, and validating security tokens, and ways to establish, assess the presence of, and broker trust relationships. WS-Trust does not enable confident trustable messages, passing by the service provider in a hidden form, as gset does. SAML [17] and XACML [18] are XML-based approaches for authorization queries and authorization policy statements. These specifications do not concern hidden private data, which has to be verified for granting access. Shibooleth [11] implements SAML, but it does not provide accounting and payment facilities. GridBank [3] provides services for accounting. Our gset approach can integrate this capability and supports also other accounting modules, by the account provider, explained in detail below. No wrapper was built until now for GridBank, because gset is already implemented with WSRF. SwdGrid Grid Accounting System (SGAS) [20] can also be integrated and gset provides an accounting enabled third party authorization service. All stated deficiencies of the mentioned approaches give a case for gset resolving these weaknesses. 3 Secure Electronic Transaction (SET) SET [14, 15, 16] enables highly secure credit card transactions on the Internet. It allows the secure transfer and verification of credit card information between two business partners. SET was developed by MasterCard, Visa, and others intended to enhance privacy and security for online transactions. In a SET transaction, the payment information is hidden from the merchant, but the merchant can verify the information (e.g. credit card limit) through a payment gateway trusted by both sides. Vice versa, the payment gateway (including the issuer and brand) can not read the confident order information. Nevertheless, the integrity of the whole message can be verified by both parties. The mechanism providing this functionality in SET is called dual signature. The dual signature separates the payment from the order information in a way that allows verifying the integrity of the data without disclosing all information and thus ensuring privacy. To achieve this, both message parts are hashed, the hashes are concatenated and signed. Each receiver then gets his message part and the hash of the other part. By hashing his part of the message and concatenating this hash with the received hash of the other message part he can then verify the integrity of the message. SET was not commercially successful. SET could not prevail due to the lacking public key infrastructure on the web, complicated usability for the customers, low acceptance rate, and low dissemination. The SET infrastructure was discontinued by the credit card companies four years ago. With gset the main reason for the failed SET does not exist, because Grids already have public key infrastructures and now public applications as e-government (Bürgerkarte [4], etc.) provide high quality certificates (including photo IDs) which can be reused in gset. 4 gset By gset it is possible for a service requester (client, user, consumer, card holder) to access a service (resource),

3 Figure 1. gset Architecture receiving credentials by automated software interactions dynamically without having any credentials for it before. The criteria are user credit rating, reliability, trustworthiness or other user properties, verified by a third party account management service and are not disclosed to the service provider. gset allows a service to verify and decide, if it will trust and grant access to a user. In the other direction it is also possible for a user to ensure the delivery of the service with the agreed quality, because the real payment is delayed like with real credit cards, and can be revoked by the service requester at the account provider. gset provides not only confidentiality, but allows also to handle the economic and commercial attributes of a resource, and handles trust and authorization. gset is a higher security service [9, p.285]. It is an advanced authorization mechanism, with integrated accounting and privacy, based on the basic security services, which are confidentiality, data integrity, and authentication. In Grids public key infrastructures (PKIs) are used to provide the basic security services (e.g. TeraGrid, DataGrid, Gridbus and others). The adoption of gset is obvious and simple, because of the existing PKIs in Grids. The certificate management, the establishment of a reliable PKI, and its usability was one of the reasons, that SET had no commercial success in ebusiness. A prerequisite is a strong certificate policy with e.g. photo IDs to ensure the quality of all signature and encryption mechanisms used in gset. 4.1 Architecture With gset we provide an approach to construct services, which use the SET workflow to authorize requesters dynamically. gset provides a secure accounting mechanism. Figure 1 shows the overall gset architecture. Like SET itself, gset conceptually relies on a four tier architecture. This enables a maximum distribution and redundancy for the dynamic management of trust and authorizations to services. The actors in the gset architecture are respectively clients, account providers, service providers, and trust managers. Clients are service requesters. In the SET concept this is originally the consumer (card holder). It is required to have an account issued by an account provider. The service requester is unknown to the service provider before the beginning of the initial request of a service. Account providers are like credit card companies (brand, issuer) in the original SET concept. They issue accounts (credit cards) and have a trust relation to their customers. How this trust was earned depends on the business context. It can be a bank account with a certain amount or other relations. Account providers trust in the behavior of clients by certain assurances (e.g. monetary entities or organizational relations). Service providers make services available. For example they provide storage space etc. In the original SET concept they were the online sellers (merchant). They need at least a relation to one trust manager as a gateway to an account provider. By this the service provider gets guarantees about the client s behavior without harming the privacy of clients. Trust managers are the link between the service providers and the account providers. They manage the payment and verify the accounts of the clients at the account provider. In the original SET concept this was the payment gateway. The trust manager must have a contract with the client s account provider to establish a successful authorization. One trust manager can handle the gateway requests to different account providers. The authentication of all parties is done through valid and trusted certificates. Grid s PKI provides this inherently with a network of CAs and certificates for users, hosts and services. 4.2 Workflow Figure 2 describes the standard gset workflow, which is used by services to authorize unknown clients. The upper figure shows the preconditions for a gset transaction, also called initial state. The lower figure describes the interactions of one specific authorization (transaction). The initial state is as follows. The client has a valid account from an account provider. The service provider has an established relation with at least one trust manager. The service provider needs to know the endpoint address to pass on the authorization request. Later it needs to verify if the trust manager has a contract with the client s account provider. Further, an interconnect exists between trust managers and account providers, by which a specific service provider and a specific client are related logically. The trust manager relays the authorization information

4 request information depending on the service type, like order information. It is encrypted using the service provider s public key provided by the certificate sent to the client before. The second part is the authorization request part, which is addressed to the trust manager and contains the payment information. These are account information of a specific account provider together with the amount and the currency of the service provider costs, on which the client and service agreed before the transaction. This part of the message is then encrypted using the trust manager s public key to be tunneled to the trust manager via the service provider. The hashes of both parts are calculated and attached to the message. Finally the client calculates the dual signature by concatenating and signing the two hashes and sends the request Figure 2. gset Workflow to the account provider. It also provides a list of account providers it has contracted. The trust manager can be tied closely to one or more account providers. The account provider guarantees for the expected client behavior and eventual payments which are involved in the transaction. How a client finds a proper service is not addressed by gset, because already different solutions exist, as Grid Information Services GT4 MDS, UDDI, or LDAP etc. After the agreement between client and service on certain quality and quantity characteristics (e.g. cpu time, max costs, etc.) of a client request the gset authorization to this resource can start. The gset transaction includes several steps described below and marked in Figure 2 (lower image): 1. The client wants to access an already negotiated resource. It contacts the service provider to initiate the transaction sending the identifier of its account provider. 2. After receiving the necessary certificates the client software constructs the two part message and the dual signature, which is used to authorize the client for the service. The first part is the service request part, which is addressed to the service provider and contains the 3. In this step the client sends the two part message to the service provider. On receiving the two part message from the client the service provider checks the message integrity. It decrypts the service request part of the message and calculates the hash. Then the computed hash is concatenated with the included hash of the authorization request part of the message. This dual hash is compared to the hash included in the message. Finally the dual signature is validated. 4. If all validations are finished correctly, the service provider contacts the trust manager, relaying the authorization request part as well as the dual signature and a hash of the service request part of the message. It also includes amount and currency which are to be authorized. On receiving the authorization request from the service provider, the trust manager checks the integrity of the message. It decrypts the authorization request message and calculates its hash. This hash and the hash of the service request part of the message received from the service provider are concatenated and compared to the also relayed dual hash. Finally, the dual signature is verified. If the message integrity is asserted the amount and currency sent to the trust manager by client and service provider are compared. 5. All this being successful, the trust manager contacts the account provider asking for authorization. 6. The account provider checks the client s profile and liquidity. If the client has sufficient credits the account provider confirms the client s trustworthiness.

5 7. The trust manager sends the confirmation back to the service provider along with a token representing an eventual fee for the service usage. 8. The result of the authorization request is also passed through to the client. The service provider grants now access to the requested resources. If the result was negative, the resource request is ignored by the service provider. Later, after the resource was consumed by the client, the service provider can use the token it received from the trust manager to collect the fee for its services. When the service provider sends back the token to collect the fee, the trust manager contacts the account manager to arrange the transaction. 5 Implementation The gset proof-of-concept implementation is based on the Globus Toolkit 4 (GT4) with its Java web service container. To gset enable any OGSA WSRF service it is only necessary that the service provider derives his service and resource from the gset components. Thus any WSRF Globus can be gset enabled. The service provider and trust manager of gset are modeled as stateful WSRF web services. gset uses only internally the PKI certificate management of GT4, the client therefore needs a valid Globus key pair. The authentication and integrity of the conversation between the client and the service is established by the transport level security (TLS) of Globus. We applied TLS because of performance reasons, but gset works also by message level security (Secure Message and Secure Conversation). The authorization to services is only managed by gset and does not require any Globus authorization services. The dual signature functionality of gset is built on top of the encryption, decryption, and signing mechanisms of the Apache XML security [2], the WSS4J [1] and JCE [12], all provided by GT4 and J2SE. This section describes in three subsection the WSRF implementation of the trust manager, the service provider, and the account manager. 5.1 Trust Manager gset includes a skeleton implementation of a trust manager. The trust manager service provides the following four operations: getcertificate getaccountproviderlist createmanagedtrust collectpayment The relation between trust manager and service provider is initialized by the getcertificate operation. The received certificate is sent to the client at the initiation of a transaction. This operation does not take any input parameters and TLS is used to ensure integrity. As the certificate is public, privacy is not necessary. The operation getaccountproviderlist returns a list of URIs of account providers contracted by the trust manager. This operation also does not take input parameters, and uses TLS to ensure integrity but does not require privacy. On Step 4 of the gset workflow, the operation createmanagedtrust is called by the service provider. As input parameters this operation requires three parts. These are the encrypted authorization request sent by the client, the complementary message by the service provider, and the hash of the service request. The complementary message must contain the transaction id, amount and currency fitting to the corresponding values in the client s message. The complementary message is signed and encrypted by a hybrid method. If all checks on integrity and the request for authorization by the account manager succeed, a resource is created holding amount and currency. Further a token is generated and sent back to the service provider after being signed and encrypted. This operation does not use any of the GT4 embedded security mechanisms. Everything is encrypted and signed directly by the services. The generated token is cashed by the operation collectpayment. This method uses TLS to guarantee integrity and privacy of the contents. 5.2 Service Provider gset includes the abstract class GSETServiceProvider implementing the logic of a service provider to handle authorization requests and a WSDL file. The WSRF resource must contain the following properties: gsetauthorization of the type boolean indicates if the authorization was successful. gsetaccountprovider of the type URI holds the identifier of the client s account provider. gsettransactionid contains the transaction id generated by the service. gsettoken stores the token received from the trust manager. Additional resource properties are possible and depend on the specific service type. gset contains the abstract class GSETResource that offers to service providers an implementation of the resource properties. To allow SET enabled authorization, the service must implement at least the following two operations: getoffer

6 initiatetransaction requestauthorization The client requests by the getoffer operation an offer for a specific service request (e.g. data volume size, etc.). It is an agreement over the QoS and payment, which will be authorized by both parties by gset. The client can decide now if he accepts the offer and requests the service together with an authorization of the offer by the following steps. The getoffer operation calls in any specific gset enabled service an evaluation method, which is also used later during the gset transaction for verifying the agreement against the service request. The client states with the initiatetransaction operation that it wants to access the service and provides in this step the URI representing its account provider. The service provider creates a WSRF resource and initiates the gset properties mentioned above. The client receives as response a transaction id, an endpoint reference, and the certificates of trust manager and service provider. This operation uses the GT4 TLS to ensure the integrity of the message. There is no need to hide anything at this stage. The request for authorization is done by calling servicerequest which takes the two part message as parameter. These are the two parts described in Step 2 of the previous section, respectively the service request part and the authorization request part. The service request part can consist of anything that can be put into a SOAP message part. The content of the servicerequest element is first hashed and then encrypted by the Apache XML security library using a generated symmetric key. The key is encrypted with the service provider s public key and attached to the message along with the hash of the service request. The authorization request part consists of the transaction id generated by the service provider, the identifier of the client s account provider, and the amount and currency to be authorized. The content of the authorizationrequesttype element is treated in the same way as the service request, only that the public key used is the one of the trust manager rather than the service provider s. The two generated hashes are then concatenated and form the dual hash, which is also attached to the message and signed, using the client s private key. When the service receives the message it checks the integrity as described in the previous section. It decrypts the service request part of the message and calculates the hash. This hash is concatenated with the hash of the authorization request part which is also contained in the message. The result is compared to the dual hash sent by the client. If they are equal, the integrity of the dual hash is verified using the client s public key. 5.3 Account Provider The account provider manages the private client information. The interface of the gset account provider has the following operations: checkauthorization transfercredits The operation checkauthorization is called on Step 5 of the gset workflow by the trust manager. If the authorization can be granted according to the client s liquidity it returns true, otherwise false. Furthermore, the authorized amount is stored in the account for the real payment transfer. The operation uses TLS to ensure integrity and privacy of the message content. The operation transfercredits is used by the service provider to invoke the payment transfer process. Before performing the transfer, the requested amount is compared to the previously authorized amount. TLS is used to ensure privacy and integrity. 6 gset Use Case and Evaluation The dynamic gset authorization minimizes the administrational effort for loosely coupled virtual organizations and provides accounting and privacy for the service requester. Grids enable the distribution of workload and are highly dynamic. For business concerns and building a real market, it is not adequate to participants to manage certificates for ad-hoc authorizations. Furthermore, it is a must to guarantee the privacy of the participants. A storage provider can offer a storage service to unknown clients, because the service requester earns the needed trust by the trust manager. The trust manager relates the client s request to its account provider. A service requester (customer) needs to store its data in a storage service. Furthermore, he wants to ensure that his privacy is not violated. To ensure the privacy he can use strong encryption mechanism for his data, so that the storage provider can not access the information in the data. The transaction data are secured by gset. For the requester the payment transaction takes place after the consumption of the service, like with real credit card payments. If the requester has not got the service in the agreed QoS, he can make a reclamation at the account provider. On the other hand, the storage provider is not interested in details about the data and respects the privacy of its customer. Nevertheless the provider needs to ensure that the requester is trustable and pays for the used storage. In a market of service providers the policy is quite simple. The provider sells to anybody who does not have any

7 legal or rating problem. By gset it is possible to transfer the permission to check this information for one specific transaction, but without disclosing the private information. Any GT4 service can be gset enabled easily by the implementation described in the previous section. We implemented an exemplary WSRF storage service. Java was used as development language. The WSRF storage service contains three basic storage operations storedata, getdata, and destroydata. The resource class holds the storage location and the allocated size for the data. The storedata operation creates a resource for storing the transferred data. There are only slight changes to an existing storage provider to enable it for gset authorization, described as follows: 1. The service provider class is derived from the abstract class GSETServiceProvider. 2. The service provider s WSRF resource class needs to be derived from the abstract class GSETResource. 3. To extract the service request, the method servicerequest in the service provider class has to be overridden. After calling the super method the detailed service request information can be processed. 4. The storedata method has to be adapted. If the WSRF resource does not exist, the data must not be accepted, because there was no successful authorization before. 5. The Service Provider module also needs a way to determine the price for a given request. If the service s class is derived from GSETServiceProvider, this can be achieved conveniently by overriding the protected method evaluaterequest. Otherwise the module looks for the global JNDI property gsetrequestevaluator. This property should point to a class implementing the interface GSETEvaluator. If such a property is found, the class is loaded and the method evaluate is called on it. The real data transfer is out of the scope of gset. The storedata operation of our use case implementation does include the data directly in the message. Nevertheless, redirects to other data transfer services, as GridFTP/RFT are possible. The use case implementation is freely available for download on the project webpage [22]. We applied the storage service in the N2Grid [19] project for managing artificial neural network data. The screen shot of the example client for the gset enabled storage service is available on the project webpage. The screen shot shows that the getoffer method of gset is called to agree on a certain QoS/price by the Get Offer button. The authorization and service request takes Figure 3. Overhead of gset versus gridmap place by Start Transfer. On the Retrieve panel all references of the successful data transfers are stored, which can be retrieved by the getdata operation and deleted by the destroydata operation. 6.1 Evaluation We evaluated gset by comparing the gset enabled storage service with same storage service based only on GT4, respectively these services are called in the following gsetstore and gt4store. The gt4store service had additionally a separate getoffer method, because it does not inherit the method from gset. The gt4store service uses gridmap file authorization and does not provide the following functions without violating the requesters privacy: Secure accounting Verification of requester credit rating Dynamic authorization The services were deployed in a GT4.0.1 Java core container (with TLS) running on Debian sarge Linux (kernel ), on a Dell PowerEdge 2850 with two Intel Xeon CPU 3.60GHz processors, 4GB of RAM with 1,400 GB storage. The Java clients run on a Windows XP workstation. The interconnection between server and client was a switched 100MBit Ethernet. We measured the execution time of the getoffer and the storedata operation on client side for different workloads (data transfer size). The total execution time consists of the execution time of getoffer and storedata, whereas both execution times consist of the service execution time (authorization time, request processing), the transfer time (network latency and throughput, TLS), and the client time (construction of the request). Every time was measured 50 times and the median was used for the statistical analysis. The differences in the total execution time between the

8 Figure 4. Total Time of gset and gridmap gsetstore and the gt4store result only from the authorization time differences. As expected, the getoffer execution time of both services are equal for any workload, because no authorization is required and done. Figure 3 shows the relative overhead of gset versus gridmap authorization. The overhead is qualified because of the functional advances of gset. By increasing the workload the authorization overhead decreases relatively, therefore Figure 3 shows that the gset overhead is nearly constant for small workloads. Nevertheless, the curve decreases because of the dominance of the request processing time for high workloads and the negligible authorization time. Figure 4 shows the absolute execution times of gsetservice and gt4service calls for different workload. It shows that the execution time for small workloads (storing 512 Byte up to 50kB) is constant. This shows that the request processing time can be neglected for calculating the real overhead of gset for small workloads. 7 Conclusion Summing up, gset enables trust management in loosely coupled commercial virtual organizations with inherent secure accounting and privacy. Transparent access to different service providers is granted by a trust manager / account provider network. An underlaying economic model manages the authorizations for clients by the advanced gset service providing trust for both parties. Every service consumption can be authorized separately and no static policy is required. This goes beyond the existing virtual organization authorization framework (e.g. VOMS/CAS). Customer privacy in commercial environment is an important issue. gset maintains private information of clients confidential. Nevertheless, a service provider has guarantees and can trust in client s characteristics. Consuming Grid Services with a gset account is comparable to pay by a personal credit card in many different shops without disclosing the credit card number to them. gset is an enabling step to make Grids a platform for commercial workflows. References [1] Apache. WSS4J, [2] Apache. XML Security, [3] A. Barmouta and R. Buyya. GridBank: A Grid Accounting Services Architecture (GASA) for Distributed Systems Sharing and Integration. In 17th Annual International Parallel and Distributed Processing Symposium (IPDPS 2003) Workshop on Internet Computing and E-Commerce, page 245a, Nice, France, April 22-26, IEEE Computer Society Press. [4] Bürgerkarte, [5] G. Coulouris, J. Dollimore, and T. Kindberg. Distributed Systems. Addison-Wesley, 3rd edition, [6] I. Foster. What is the Grid? A Three Point Checklist. Technical report, Argonne National Laboratory and University of Chicago, July [7] L. Giussani. The Religious Sense. McGill-Queens, October [8] The Globus Security Team. Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective, December 8, Version 2. [9] H. R. Hansen and G. Neumann. Wirtschaftsinformatik 1, Grundlagen und Anwendungen. Lucius & Lucius, Stuttgart, 9th edition, [10] M. Humphrey, M. R. Thompson, and K. R. Jackson. Security for Grids. Proceedings of the IEEE, 93(3): , March [11] Internet2/MACE. Shibboleth Project, [12] Java Cryptography Extension (JCE), [13] H. Kishimoto. OGSA Status and Future, March 14, GGF13 OGSA-WG. [14] MasterCard, VISA. SET Secure Electronic Transaction Specification, Book 1: Business Description, May 31, Version 1.0. [15] MasterCard, VISA. SET Secure Electronic Transaction Specification, Book 2: Programmer s Guide, May 31, Version 1.0. [16] MasterCard, VISA. SET Secure Electronic Transaction Specification, Book 3: Formal Protocol Definition, May 31, Version 1.0. [17] OASIS. Security Assertion Markup Language (SAML) 1.0 Specification Set, November OASIS Standard. [18] OASIS. extensible Access Control Markup Language (XACML) 1.0 Specification, February [19] E. Schikuta, H. Wanek, and T. Weishäupl. Neural Networks in the Grid. University of Vienna, [20] SweGrid. SweGrid Grid Accounting System (SGAS), [21] Virtual Organization Membership Service (VOMS), [22] T. Weishäupl, C. Witzany, and E. Schikuta. gset. University of Vienna, shrink/gset.

2 Transport-level and Message-level Security

2 Transport-level and Message-level Security Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective The Globus Security Team 1 Version 4 updated September 12, 2005 Abstract This document provides an overview of the Grid Security

More information

Abstract. 1. Introduction. Ohio State University Columbus, OH 43210 {langella,oster,hastings,kurc,saltz}@bmi.osu.edu

Abstract. 1. Introduction. Ohio State University Columbus, OH 43210 {langella,oster,hastings,kurc,saltz}@bmi.osu.edu Dorian: Grid Service Infrastructure for Identity Management and Federation Stephen Langella 1, Scott Oster 1, Shannon Hastings 1, Frank Siebenlist 2, Tahsin Kurc 1, Joel Saltz 1 1 Department of Biomedical

More information

IGI Portal architecture and interaction with a CA- online

IGI Portal architecture and interaction with a CA- online IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following

More information

Managing Credentials with

Managing Credentials with Managing Credentials with MyProxy Jim Basney National Center for Supercomputing Applications University of Illinois jbasney@ncsa.uiuc.edu http://myproxy.ncsa.uiuc.edu/ What is MyProxy? A service for managing

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

An approach to grid scheduling by using Condor-G Matchmaking mechanism

An approach to grid scheduling by using Condor-G Matchmaking mechanism An approach to grid scheduling by using Condor-G Matchmaking mechanism E. Imamagic, B. Radic, D. Dobrenic University Computing Centre, University of Zagreb, Croatia {emir.imamagic, branimir.radic, dobrisa.dobrenic}@srce.hr

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

Chapter 12 GRID SECURITY ARCHITECTURE: Requirements,fundamentals, standards, and models

Chapter 12 GRID SECURITY ARCHITECTURE: Requirements,fundamentals, standards, and models Author manuscript, published in Security in Distributed, Grid, Mobile, and Pervasive Computing, Auerbach Publications, pp. 255-288, April, 2007 https://www.nics.uma.es Security in Distributed, Grid, and

More information

Presented By: Muhammad Afzal 08May, 2009

Presented By: Muhammad Afzal 08May, 2009 Secure Web ServiceTransportation for HL7 V3.0 Messages Authors: Somia Razzaq, Maqbool Hussain, Muhammad Afzal, Hafiz Farooq Ahmad Presented By: Muhammad Afzal 08May, 2009 NUST School of Electrical Engineering

More information

GRID COMPUTING Techniques and Applications BARRY WILKINSON

GRID COMPUTING Techniques and Applications BARRY WILKINSON GRID COMPUTING Techniques and Applications BARRY WILKINSON Contents Preface About the Author CHAPTER 1 INTRODUCTION TO GRID COMPUTING 1 1.1 Grid Computing Concept 1 1.2 History of Distributed Computing

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

Grid Security : Authentication and Authorization

Grid Security : Authentication and Authorization Grid Security : Authentication and Authorization IFIP Workshop 2/7/05 Jong Kim Dept. of Computer Sci. and Eng. Pohang Univ. of Sci. and Tech. (POSTECH) Contents Grid Security Grid Security Challenges Grid

More information

Federated Identity Architectures

Federated Identity Architectures Federated Identity Architectures Uciel Fragoso-Rodriguez Instituto Tecnológico Autónomo de México, México {uciel@itam.mx} Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET Institut National des Télécommunications,

More information

A Middleware Strategy to Survive Compute Peak Loads in Cloud

A Middleware Strategy to Survive Compute Peak Loads in Cloud A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: sashko.ristov@finki.ukim.mk

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

A QoS-aware Method for Web Services Discovery

A QoS-aware Method for Web Services Discovery Journal of Geographic Information System, 2010, 2, 40-44 doi:10.4236/jgis.2010.21008 Published Online January 2010 (http://www.scirp.org/journal/jgis) A QoS-aware Method for Web Services Discovery Bian

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES

TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES Xiaoyu Li a and Maree Pather b a Department of Information Technology, Nelson Mandela Metropolitan University b Department of Applied

More information

Network-based Access Control

Network-based Access Control Chapter 4 Network-based Access Control 4.1 Rationale and Motivation Over the past couple of years, a multitude of authentication and access control technologies have been designed and implemented. Although

More information

Globus Toolkit: Authentication and Credential Translation

Globus Toolkit: Authentication and Credential Translation Globus Toolkit: Authentication and Credential Translation JET Workshop, April 14, 2004 Frank Siebenlist franks@mcs.anl.gov http://www.globus.org/ Copyright (c) 2002 University of Chicago and The University

More information

This Working Paper provides an introduction to the web services security standards.

This Working Paper provides an introduction to the web services security standards. International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand

More information

Distributed Systems and Recent Innovations: Challenges and Benefits

Distributed Systems and Recent Innovations: Challenges and Benefits Distributed Systems and Recent Innovations: Challenges and Benefits 1. Introduction Krishna Nadiminti, Marcos Dias de Assunção, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory Department

More information

SWIFT: Advanced identity management

SWIFT: Advanced identity management SWIFT: Advanced identity management Elena Torroglosa, Alejandro Pérez, Gabriel López, Antonio F. Gómez-Skarmeta and Oscar Cánovas Department of Information and Communications Engineering University of

More information

Web Services Security with SOAP Security Proxies

Web Services Security with SOAP Security Proxies Web Services Security with Security Proxies Gerald Brose, PhD Technical Product Manager Xtradyne Technologies AG OMG Web Services Workshop USA 22 April 2003, Philadelphia Web Services Security Risks! Exposure

More information

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282 Web Service Security Anthony Papageorgiou IBM Development March 13, 2012 Session: 10282 Agenda Web Service Support Overview Security Basics and Terminology Pipeline Security Overview Identity Encryption

More information

GT 6.0 GSI C Security: Key Concepts

GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the

More information

P ERFORMANCE M ONITORING AND A NALYSIS S ERVICES - S TABLE S OFTWARE

P ERFORMANCE M ONITORING AND A NALYSIS S ERVICES - S TABLE S OFTWARE P ERFORMANCE M ONITORING AND A NALYSIS S ERVICES - S TABLE S OFTWARE WP3 Document Filename: Work package: Partner(s): Lead Partner: v1.0-.doc WP3 UIBK, CYFRONET, FIRST UIBK Document classification: PUBLIC

More information

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

A Service Oriented Security Reference Architecture

A Service Oriented Security Reference Architecture International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Stream Processing on GPUs Using Distributed Multimedia Middleware

Stream Processing on GPUs Using Distributed Multimedia Middleware Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research

More information

Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware

Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware R. Goranova University of Sofia St. Kliment Ohridski,

More information

OIO SAML Profile for Identity Tokens

OIO SAML Profile for Identity Tokens > OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6

More information

Ciphire Mail. Abstract

Ciphire Mail. Abstract Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the

More information

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce

More information

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more

More information

Federated Identity Management Solutions

Federated Identity Management Solutions Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology jkallela@cc.hut.fi Abstract Federated identity management allows users to access multiple services based on a single

More information

Distributed Identity Management Model for Digital Ecosystems

Distributed Identity Management Model for Digital Ecosystems International Conference on Emerging Security Information, Systems and Technologies Distributed Identity Management Model for Digital Ecosystems Hristo Koshutanski Computer Science Department University

More information

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart sascha.neinert@rus.uni-stuttgart.de

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4

Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4 Concepts and Architecture of the Grid Summary of Grid 2, Chapter 4 Concepts of Grid Mantra: Coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations Allows

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005 Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.

More information

Rights Management Services

Rights Management Services www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,

More information

IBM Solutions Grid for Business Partners Helping IBM Business Partners to Grid-enable applications for the next phase of e-business on demand

IBM Solutions Grid for Business Partners Helping IBM Business Partners to Grid-enable applications for the next phase of e-business on demand PartnerWorld Developers IBM Solutions Grid for Business Partners Helping IBM Business Partners to Grid-enable applications for the next phase of e-business on demand 2 Introducing the IBM Solutions Grid

More information

Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro

Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro Achieving a High-Performance Virtual Network Infrastructure with PLUMgrid IO Visor & Mellanox ConnectX -3 Pro Whitepaper What s wrong with today s clouds? Compute and storage virtualization has enabled

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Developers Integration Lab (DIL) System Architecture, Version 1.0

Developers Integration Lab (DIL) System Architecture, Version 1.0 Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2

More information

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004

More information

Chapter 10. e-payments

Chapter 10. e-payments Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss

More information

Web Services Trust and XML Security Standards

Web Services Trust and XML Security Standards Web Services Trust and XML Security Standards Date: April 9, 2001 Version: 1.0 Copyright 2001-2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States

More information

Chapter 15 User Authentication

Chapter 15 User Authentication Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech (woong07@seoultech.ac.kr) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric

More information

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy jmacy@forumsys.com CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates

More information

Security Model in E-government with Biometric based on PKI

Security Model in E-government with Biometric based on PKI Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute

More information

Federation Proxy for Cross Domain Identity Federation

Federation Proxy for Cross Domain Identity Federation Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 m-hatake@ax.jp.nec.com

More information

Securing Web Services With SAML

Securing Web Services With SAML Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems

On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems Ginés Dólera Tormo Security Group NEC Laboratories Europe Email: gines.dolera@neclab.eu

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Run-time Service Oriented Architecture (SOA) V 0.1

Run-time Service Oriented Architecture (SOA) V 0.1 Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...

More information

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using

More information

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,

More information

Instructions on TLS/SSL Certificates on Yealink Phones

Instructions on TLS/SSL Certificates on Yealink Phones Instructions on TLS/SSL Certificates on Yealink Phones 1. Summary... 1 2. Encryption, decryption and the keys... 1 3. SSL connection flow... 1 4. The instructions to a certificate... 2 4.1 Phone acts as

More information

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?

More information

CryptoNET: Security Management Protocols

CryptoNET: Security Management Protocols CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Department of Industry and Science

Department of Industry and Science Services Catalogue Department of Industry and Science Contents 1 Introduction 2 VANguard Services 2 About the VANguard Services Catalogue 2 Contact Details 2 2 VANguard Services 3 User Authentication Service

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

Resolution Database Privacy preserving based Single-Signon

Resolution Database Privacy preserving based Single-Signon Resolution Database Privacy preserving based Single-Signon Solution S.S Dhanvantri Divi 1, T.Swapna 2, K.J.Sharma 3 1 Student, TRR ENGINEERING COLLEGE, PATANCHERU, HYDERABAD 2 Associate Professor, TRR

More information

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Certification Practice Statement

Certification Practice Statement Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require

More information

How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip

How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

Virtual Hosting Environments for Online Gaming TG6 TG8 Meeting Paris 2008 David Brossard Senior Researcher BT CTO

Virtual Hosting Environments for Online Gaming TG6 TG8 Meeting Paris 2008 David Brossard Senior Researcher BT CTO Virtual Hosting Environments for Online Gaming TG6 TG8 Meeting Paris 2008 David Brossard Senior Researcher BT CTO Involved Partners: ANDAGO, ATOS, BT, CRMPA, URJC Table of Contents 1. BEinGRID Overview

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

Authentication is not Authorization?! And what is a "digital signature" anyway?

Authentication is not Authorization?! And what is a digital signature anyway? Authentication is not Authorization?! And what is a "digital signature" anyway? Prepared by R. David Vernon Revised 12/01 Introduction REV 1A As part of the IT Architecture Initiative, the Office of Information

More information

EVALUATION OF WEB SERVICES IMPLEMENTATION FOR ARM-BASED EMBEDDED SYSTEM

EVALUATION OF WEB SERVICES IMPLEMENTATION FOR ARM-BASED EMBEDDED SYSTEM EVALUATION OF WEB SERVICES IMPLEMENTATION FOR ARM-BASED EMBEDDED SYSTEM Mitko P. Shopov, Hristo Matev, Grisha V. Spasov Department of Computer Systems and Technologies, Technical University of Sofia, branch

More information

Enhancing A Software Testing Tool to Validate the Web Services

Enhancing A Software Testing Tool to Validate the Web Services Enhancing A Software Testing Tool to Validate the Web Services Tanuj Wala 1, Aman Kumar Sharma 2 1 Research Scholar, Department of Computer Science, Himachal Pradesh University Shimla, India 2 Associate

More information

Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago

Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University

More information

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Identity Server Guide Access Manager 4.0

Identity Server Guide Access Manager 4.0 Identity Server Guide Access Manager 4.0 June 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF

More information