Project Orwell: Distributed Document Integrity Verification
|
|
- Lester Elvin Fitzgerald
- 8 years ago
- Views:
Transcription
1 1 Project Orwell: Distributed Document Integrity Verification Tommy MacWilliam Abstract Project Orwell is a client and server application designed to facilitate the preservation of documents. Unlike existing projects, Orwell promotes the duplication of a given document across a network of hosts and targets individuals (as opposed to organizations or universities) seeking to preserve content by introducing an incentive system. Orwell allows users to install their own client in order to upload content in any format to a central server as well as host content uploaded by others. The resulting distribution of equivalent content across multiple hosts ensures documents content will be preserved even if some client(s), particularly that of the original author, are compromised. The integrity of the documents hosted on the user s client is manually or automatically verified against the network of clients also hosting that document, such that the central server does not play a role in the verification process. In the event of a conflict, users are notified and are able to view differences between documents versions as well as resolve conflicts in hosted documents. I. INTRODUCTION As we discussed in class, cloud-hosted e-books allow content providers to push updated documents to users devices unbeknownst to their owners. This issue is representative of the larger problem of document integrity verification: how can content providers ensure their versions of hosted documents match the accepted, standard versions? For example, suppose a website hosts the text of the United States Constitution. If a malicious user gains access to the server, he or she could potentially change (perhaps very slightly) the text of the site s version of the Constitution without notifying the site administrator. In the case of a high-traffic website, this change has the potential to propagate to other sources, as users have reason to believe the hosted copy of the document is correct. Alternatively, consider the case of a software aggregation service like CNET s Download.com: mirrored installers must match those of the original distributors to protect users from malware. However, content providers cannot simply rely on a version hosted by a single authoritative source, as a compromise of this central store is no different than the aforementioned scenario. Instead, distributing the task of document verification across a network of providers will allow hosts to verify content without the need for a centralized data store; rather than comparing a document to a single correct copy, content providers can compare their copy to those of multiple peers. In the event any node in the network is found to have a document mismatch, the network can be notified so the error can be corrected and the document can be rolled back to its previous state. Project Orwell seeks to address the problem of document integrity assurance. After registering with a central server and obtaining an API key, Orwell users download a client package that functions as a content management application. Using the client application, users can upload content for other clients to host as well as host content uploaded by other users. Because the content is duplicated across many hosts, documents will be preserved even if a single server is compromised or ceases to host the content. Furthermore, documents integrity is periodically verified across hosts in order to ensure that all copies of the document
2 2 are equivalent to the originally-uploaded document. Subsequently, Project Orwell provides a mechanism for users to preserve documents while ensuring readers that the content is at all times faithful to the originally uploaded document. In this paper, we present Project Orwell s design decisions and implementation. In Section II, we present work related to Project Orwell and discuss the differences in Orwell s approach. In Section III we describe how each of Orwell s components was implemented, and in Section IV, we discuss future areas of research. A. Cloud Storage II. RELATED WORK Many users turn to traditional cloud storage systems like Box, Dropbox, and SugarSync to back up their files. Each of these services includes a client application that automatically synchronizes users content with a central server hosted by a third-party. If multiple devices (potentially owned by different users) are configured to collaborate on a directory or document, then the changes of one user will be automatically propagated to the other devices. Project Orwell seeks to solve two problems with this cloud storage model. First, these storage solutions are most commonly used to back up content on one user s device to the cloud. However, implicit in the single backup model is trust in the third party, as users content will be lost or inaccessible if the server is compromised or the third party ceases to exist. Second, the collaboration model allows one user to create changes that can propagate to all consumers of the document. While in many cases this model is ideal (e.g., if many users are contributing to a single document), it is not appropriate for frozen, static content, as a user s copy of a document can be changed by another user without notice. B. LOCKSS LOCKSS [1], or Lots Of Copies Keep Stuff Safe, is a project developed by Stanford University that seeks to preserve libraries digital content. To participate in the LOCKSS network, publishers must host a LOCKSS permission statement online, and then grant permission to a library to archive its content [2]. Meanwhile, libraries install the LOCKSS software on a specialized machine, which downloads content from authorized publishers and continually verifies the integrity of the locally-hosted documents. By duplicating content across multiple LOCKSS boxes, publishers ensure seamless and constant access to documents; if the publisher s copy becomes unavailable, then readers are automatically redirected to a LOCKSShosted copy. LOCKSS has been successful in garnering adoption among both libraries and publishers the Global LOCKSS network contains over 9,000 titles from 510 publishers at the time of writing. LOCKSS thus appeals to both publishers and libraries because users have perpetual access to content owned by publishers or subscribed to by libraries. Project Orwell is built for a different audience: individuals. While LOCKSS is designed for established libraries and publishers, Project Orwell allows any user to become both a host and a publisher. For example, LOCKSS requires publishers to apply to join the LOCKSS network, charges institutions thousands of dollars in annual fees [3], and allows publishers to deny access to particular hosts, all of which exclude individuals from publishing or hosting content. On the other hand, Project Orwell is available free of charge, and there are no restrictions on what content can be published or hosted by a user. Moreover, the LOCKSS box software requires a dedicated machine with a static IP address, while Project Orwell s client can be installed on any web server without disrupting the server s ability to deliver other content (which is a more feasible requirement for an individual). Similarly, while LOCKSS attempts to route all traffic to the original publisher, Project Orwell clients deliver content
3 3 Figure 1. Users can upload and verify documents through Orwell s client application. directly, which in turn distributes the bandwidth needed to transfer content across multiple hosts; this system is more cost-effective to users whose servers do not have the bandwidth necessary for widespread content delivery. Finally, because users must opt-in to host Orwell documents (in contrast to the web crawlers used by LOCKSS), Orwell, unlike LOCKSS, incentivizes users to host documents by enforcing the constraint that users must host as many documents uploaded by others as they upload themselves. Consequently, the Project Orwell aims to establish a lower barrier of entry to participation and create a more open community. III. IMPLEMENTATION Because Orwell requires the installation of a client application on the user s web server, Orwell was designed using a standard LAMP stack in order to maximize compatibility and minimize dependency constraints. Both the client and server utilize CakePHP [4], a web framework for the PHP [5] programming language. The backend stores information in a MySQL [6] database, and the jquery [7] and Bootstrap [8] JavaScript and CSS libraries are used in frontend components. The source code for both the client and server application can be found on GitHub [9]. Both components adhere to the MVC architecture. As such, all models are found in app/model, all controllers in app/controller, and all views in app/view. JavaScript code is located in app/webroot/js, and CSS is located in app/webroot/css. A. Installation To register for an Orwell client, users first navigate to the Project Orwell website, on which the server component of the project is hosted. To sign up, users need only provide a valid address and URL at which the client will be publicly hosted. Upon signing up, a random (and salted) shared secret is generated by the server for the client. This shared secret will later be used by the client to authenticate against the central server for all API requests to ensure that requests cannot be forged to clients or to the server. The user can then download the client installer, which when run on the
4 4 Figure 2. of hosts. Clients upload documents to the Orwell server so other clients can host them, thereby creating a network client s web host, downloads the Orwell client application, installs dependencies, creates the necessary MySQL database schema, and configures the server-generated API key. B. Uploading Documents When users navigate to their Orwell client (which must be accessible at the URL provided by the user upon signing up for the client) for the first time, they are prompted to create an administrator account. Any number of user accounts can be created on the client, such that multiple individuals can have the ability to manage the client s documents, and for security purposes, a valid user must be logged in to perform any document management operations on the client. Users can upload documents of any type from their client. After selecting a document and giving it a title, the document is uploaded from the client to the server, along with the client s shared secret and webroot (to enforce authentication). Upon receiving the document, the server computes a 128-bit MD5 hash and a 160-bit SHA-1 hash of its contents. If another document on the server has the same MD5 and SHA-1 hashes as the uploaded document, the server concludes that the documents are equivalent and does not store a copy of the document. The server is thus able to de-duplicate content in the interest of space efficiency on the server. If, on the other hand, the document does not already exist on the server, the document is assigned a globally unique ID that will identify the document across all clients and the document is stored on the server s filesystem. Finally, in either case, the uploaded document is also stored on the client s filesystem using the document s globally unique identifier. C. Downloading Documents to Host Users can also browse the universe of documents hosted across all Orwell networks from the client. This list is both sortable and searchable, and users can also see the number of clients that are already hosting the document. From this list of documents (which only includes documents that are not hosted on the user s client), users can download documents from the server to host on their own client. When the user presses a document s Download button, an AJAX request is sent to the client indicating the ID of the document that will be downloaded. First, the client checks if the document in question is already hosted (as by searching its database for the document s identifier), and aborts the process if the document is found, again in the interest of de-duplication. The client then makes a request to the central server with both the ID of the document to be downloaded and the client s API key. The server responds with the
5 5 Figure 3. When a new client hosts a document, the verification network remains a connected graph. set of URLs at which the same document is hosted by other clients, which is then stored on the client s database to be used in the document verification process described in the next section. The server also notifies each of these hosts that a new client has joined the verification network for the document being downloaded, as seen in Figure 3, such that all clients in the network form a connected graph. The server then sends the contents of the file to be downloaded to the downloading client, per Figure 2. The client is thus able to store a local copy of both the the document and the URLs of other clients that are also hosting the document. Both uploaded and downloaded documents are accessible via a public URL on the client. Subsequently, a user can easily view the content hosted on a client via a publicly-accessible URL. D. Document Verification The document verification process ensures the integrity of the documents stored on clients by comparing their contents to those of other Orwell clients hosting the same document. On the client s document management view, seen in Figure 1, users can verify their documents integrity by simply clicking the Verify button. This triggers an AJAX request to the client with the ID of the document to verify. The client then randomly selects another client also hosting the document to verify against. The use of randomness by all clients across all networks ensures that all hosts have an equal probability of being chosen, which maximizes the probability that a document that has been compromised is detected by some client. After selecting a client to verify against, the client compares an MD5 hash and SHA-1 hash of its document to hashes of the document hosted by the selected client. If either of the clients hash values do not match, then the versions of the document are not the same, which triggers a notification to the verifying client. The success of Orwell s document verification model depends on multiple users opting in to host a given document. To encourage users to host others documents, Orwell implements a give-and-take incentive structure. After creating their Orwell, users are able to upload five documents; for each subsequent document, users must host at least one document uploaded by another client (and users will not be able to upload additional content until they do so). This constraint is enforced by
6 6 Orwell s central server, so users cannot bypass this restriction simply by altering the source code of their own clients. In addition to verifying documents via the client view, clients can periodically verify a number of randomly selected documents. Cron [10], for example, can used to automate this process, which can be run from the commandline and utilizes the same verification code used by the web frontend. It is important to note that the average load placed on clients during the automatic document verification process does not depend on the size of the network. In a network of n clients, a client n 0 that is scheduled to perform a verification selects one of the other clients in the network with equal probability; the probability that any other client is chosen by n 0 is therefore 1/(n 1). Because each of the n clients in the network can select each other client with probability 1/(n 1) and each client makes its selection independently, the expected value for the number of times a given client is selected by another client (after all clients have performed a verification) is simply n 1 1 n 1 = (n 1) 1 = 1 by the law of n 1 total probability. Intuitively, the expected load on each client should be independent of the network s size, as with each additional client, the number of total verifications performed across the network increases, but the probability a particular client is chosen by another client decreases. This result demonstrates that automatic document verification networks are indeed scalable, such that clients hosting a popular document should not expect any increase in load on average. Rather, the load placed on clients depends on the total number of documents hosted, which parallels the inevitable constraints storage space places on the number of documents that can be hosted by a single client. Furthermore, this expected value result demonstrates that the verification network will quickly detect any document compromises. The probability that a given client in the network n 0 is selected at least once after each client has made a selection is equal to the complement of the probability that no other client selects n 0. In a network of n clients, this probability is equal to: P(n 0 ) = 1 ( ) n 2 n 1 n 1 The probability that a given client is selected at least once as the size of the document verification network increases asymptotically is thus greater than 60%, as we have: lim n [ 1 ( ) ] n 2 n 1 = 1 1 n 1 e Therefore, random client selection process should be an effective means of ensuring documents integrity across a fully connected network. E. Conflict Resolution If during the verification process two documents are found to be different, clients are given the ability to repair the documents. In the event of a mismatch, users have the ability to view the differences between the locallyhosted document and the document hosted by the client the document was verified against. Each administrator of the client is also sent an notification containing a link to this diff view. After examining the differences in the documents, the user is asked which copy of the document is correct. If the user indicates that the local copy of the document is correct, then the administrators of the other, verifying client are sent an notification where they too can view the differences between the documents. If, on the other hand, the user indicates that the locally-hosted copy of the document is incorrect, then the client can repair the document using the other client s copy. IV. FUTURE WORK Initial Orwell development has been completed and the project has been tested on a
7 7 small scale. However, future research seeks to test the performance of the implementation on a larger scale. In particular, the load placed on clients hosting a varying number of documents over varying verification network sizes should be analyzed. When signing up to host a particular document, the client should be aware of the foreseen load as a result of periodic verification. Similarly, the performance of the client application should be tested on a variety of hardware, in order to make clear to users the minimum system requirements. Furthermore, additional research should investigate the effectiveness of Orwell s incentive structure. While Orwell s give-and-take requirements for uploading documents seems fair, the model has not been tested among real users. Consequently, its effectiveness and reception (e.g., fairness, feasibility of expectations, etc.) among users is currently unknown. If the current model is indeed ineffective, then other structures, perhaps incorporating elements of gamification like achievements or karma points, should be investigated. V. REFERENCES [1] LOCKSS. [2] How LOCKSS Works. [3] How to Join. [4] CakePHP. [5] PHP. [6] MySQL. [7] jquery. [8] Bootstrap. [9] Project Orwell source code. [10] Cron.
Creating Value through Innovation MAGENTO 1.X TO MAGENTO 2.0 MIGRATION
Creating Value through Innovation MAGENTO 1.X TO MAGENTO 2.0 MIGRATION AGENDA 1. Overview of Magento 2.0 2. Features and benefits of Magento 2.0 over Magento 1.x 3. Why should we upgrade to Magento 2.0
More informationApplication Note 116: Gauntlet System High Availability Using Replication
Customer Service: 425-487-1515 Technical Support: 425-951-3390 Fax: 425-487-2288 Email: info@teltone.com support@teltone.com Website: www.teltone.com Application Note 116: Gauntlet System High Availability
More informationOverview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationIBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationIBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationSENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
More informationGUESTBOOK REWARDS, INC. Privacy Policy
GUESTBOOK REWARDS, INC. Privacy Policy Welcome to Guestbook Rewards, Inc. the online and mobile service of Guestbook Rewards, Inc. ( The Guestbook, we, or us ). Our Privacy Policy explains how we collect,
More informationDashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
More informationIBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationActive Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationUpgrade Guide. Platform Compatibility. Dell Secure Mobile Access 11.0.0 Upgrade Guide
Dell SonicOS This document describes the process of obtaining your Dell Secure Mobile Access firmware update file, verifying it, and installing it on an existing appliance. Updating a clustered pair of
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationThis presentation introduces you to the new call home feature in IBM PureApplication System V2.0.
This presentation introduces you to the new call home feature in IBM PureApplication System V2.0. Page 1 of 19 This slide shows the agenda, which covers the process flow, user interface, commandline interface
More informationHP Quality Center. Upgrade Preparation Guide
HP Quality Center Upgrade Preparation Guide Document Release Date: November 2008 Software Release Date: November 2008 Legal Notices Warranty The only warranties for HP products and services are set forth
More informationBUSINESS CHICKS, INC. Privacy Policy
BUSINESS CHICKS, INC. Privacy Policy Welcome to businesschicks.com, the online and mobile service of Business Chicks, Inc. ( Company, we, or us ). Our Privacy Policy explains how we collect, use, disclose,
More informationServer Installation Manual 4.4.1
Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:
More informationAn Enterprise Approach to Mobile File Access and Sharing
White Paper File and Networking Services An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Novell Filr Competitive
More informationCloud Based Application Architectures using Smart Computing
Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationContent Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
More informationConfiguring Failover
Configuring Failover 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationIntegrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal
Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal This Application Note provides instructions for configuring Apps settings on the Cisco OnPlus Portal and Autotask application settings
More informationekomimeetsmage Manual for version 1.0.0, 1.1.0, 1.2.0, 1.3.0, 1.4.0
ekomimeetsmage Manual for version 1.0.0, 1.1.0, 1.2.0, 1.3.0, 1.4.0 Version 0.6 Last edit: 16.05.2013 Overview 1 Introduction...3 1.1 Requirements...3 1.2 Function Overview...3 2 Installation...3 2.1 Important
More informationDocAve 6 Quickr Migrator
DocAve 6 Quickr Migrator User Guide Service Pack 6, Cumulative Update 1 Issued December 2015 1 Table of Contents What s New in this Guide... 5 About Quickr Migrator... 6 Complementary Products... 6 Submitting
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationWildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
More informationvcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationIntegration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
More informationMedia Company Reduces Time-to-Market by 80 Percent with Cloud-Hosting Solution
Microsoft Customer Solution Customer Solution Case Study Media Company Reduces Time-to-Market by 80 Percent with Cloud-Hosting Solution Overview Country or Region: United States Industry: Media and cable
More informationDocAve 6 Livelink Migrator
DocAve 6 Livelink Migrator User Guide Service Pack 7 Issued May 2016 1 Table of Contents What s New in this Guide... 6 About Livelink Migration... 7 Complementary Products... 7 Submitting Documentation
More informationGoogle Trusted Stores Setup in Magento
Google Trusted Stores Setup in Magento Google Trusted Stores is a free badging program that can improve your conversion rate and average order size by reassuring potential customers you offer a great shopping
More informationOnline Test Administrator Quick Reference Guide Updated 08/02/2012 v.2.0
Online Test Administrator Quick Reference Guide Updated 08/02/2012 v.2.0 M e s s a g e T e s t N a v ( W h a t D o e s T h i s M e a n? ) Login Screen The student will type in the Login ID and Test Code
More informationBasics Of Replication: SQL Server 2000
Basics Of Replication: SQL Server 2000 Table of Contents: Replication: SQL Server 2000 - Part 1 Replication Benefits SQL Server Platform for Replication Entities for the SQL Server Replication Model Entities
More informationCloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
More informationPLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
More informationLearning Management Redefined. Acadox Infrastructure & Architecture
Learning Management Redefined Acadox Infrastructure & Architecture w w w. a c a d o x. c o m Outline Overview Application Servers Databases Storage Network Content Delivery Network (CDN) & Caching Queuing
More informationWhy back up the Cloud?
Why back up the Cloud? The CloudBerry Lab Whitepaper The introduction Always backup your data, even if it is in the cloud. The 3-2-1 rule of data protection says keep three copies of your data, on two
More informationowncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
More informationBuilding Success on Acquia Cloud:
Building Success on Acquia Cloud: 10 Layers of PaaS TECHNICAL Guide Table of Contents Executive Summary.... 3 Introducing the 10 Layers of PaaS... 4 The Foundation: Five Layers of PaaS Infrastructure...
More informationCase Study. Data Governance Portal. www.brainvire.com 2013 Brainvire Infotech Pvt Ltd Page 1 of 1
Case Study Data Governance Portal www.brainvire.com 2013 Brainvire Infotech Pvt Ltd Page 1 of 1 Client Requirement The website is the Data Governance intranet portal. Data Governance is the practice of
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationAdministering Cisco ISE
CHAPTER 8 This chapter describes the administrative activities for the Cisco Identity Services Engine (ISE) and how to perform them. The following topics are covered: Logging In, page 8-1 System Time and
More informationOneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More informationSecure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationConfiguring WildFire. Version 1.0 PAN-OS 5.0.1. Johan Loos. johan@accessdenied.be
Configuring WildFire Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be WildFire Overview WildFire is a cloud based malware detection service. Basically is the idea when the user downloads a file,
More informationControlPoint. Advanced Installation Guide. Publication Date: January 12, 2016. Metalogix International GmbH., 2008-2016 All Rights Reserved.
ControlPoint Publication Date: January 12, 2016 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,
More informationProtecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware Attacks A Multi-tier, Defense in Depth Strategy for Securing Point of Sale Systems from Remote Access Attacks Retailers are being threatened by
More informationWildFire Cloud File Analysis
WildFire Cloud File Analysis The following topics describe the different methods for sending files to the WildFire Cloud for analysis. Forward Files to the WildFire Cloud Verify Firewall File Forwarding
More informationShop by Manufacturer Custom Module for Magento
Shop by Manufacturer Custom Module for Magento TABLE OF CONTENTS Table of Contents Table Of Contents... 2 1. INTRODUCTION... 3 2. Overview...3 3. Requirements... 3 4. Features... 4 4.1 Features accessible
More informationwww.basho.com Technical Overview Simple, Scalable, Object Storage Software
www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...
More informationAspire Systems - Experience in Digital Marketing and Social Media
Case Study Aspire Systems - Experience in Digital Table of Contents 1. Digital agency s email marketing platform goes on-demand 2. Social media launch for a major apparel company 3. Mobile CRM empowerment
More informationDatabase Replication
Database Systems Journal vol. I, no. 2/2010 33 Database Replication Marius Cristian MAZILU Academy of Economic Studies, Bucharest, Romania mariuscristian.mazilu@gmail.com, mazilix@yahoo.com For someone
More informationHow to configure Client side certificate authentication for authorization-only access / Active Sync URL s
How to configure Client side certificate authentication for authorization-only access / Active Sync URL s Juniper Networks, Inc. Overview: Authorization-only access is similar to a reverse proxy. Typically,
More informationPSA INTEGRATION GUIDE
efolder ConnectWise PSA Integration Guide Page 1 PSA INTEGRATION GUIDE Last Updated July 2014 Integration Overview ConnectWise PSA is business automation software that helps IT service providers efficiently
More informationWelcome to ncrypted Cloud!
Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the
More informationCD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services
P/N:900-1005-20 CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services (hereinafter referred
More informationEDINBURGH UNIVERSITY PRESS LIBRARIAN ADMINISTRATION USER GUIDE http://www.euppublishing.com
EDINBURGH UNIVERSITY PRESS LIBRARIAN ADMINISTRATION USER GUIDE http://www.euppublishing.com Journal Subscription Activation... 1 1. Register as an Individual User... 1 2. Subscription Confirmation Email...
More informationTABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models
1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint
More informationSecure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
More informationQualys PC/SCAP Auditor
Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
More information642-447. Cisco Implementing Cisco Unified Communications Manager, Part 1 v8.0 (CIPT1 v8.0) http://www.pass4sureofficial.com. www.dumpspdf.
642-447 Cisco Implementing Cisco Unified Communications Manager, Part 1 v8.0 (CIPT1 v8.0) http://www.pass4sureofficial.com Dumpspdf.com is a reputable IT certification examination guide, study guides and
More informationManual for merchants and developers
Manual for merchants and developers ICEPAY OpenCart Online Payment Module v 2.0.8 ICEPAY B.V. 2016-05-04 1. General Information 3 1.1 Summary (links to modules, benefits) 3 1.2 Prerequisites 4 1.3 Compatibility
More informationTECHNOLOGY WHITE PAPER Jan 2016
TECHNOLOGY WHITE PAPER Jan 2016 Technology Stack C# PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache CloudWatch Paypal Overview
More informationWeb Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity
P3 InfoTech Solutions Pvt. Ltd http://www.p3infotech.in July 2013 Created by P3 InfoTech Solutions Pvt. Ltd., http://p3infotech.in 1 Web Application Deployment in the Cloud Using Amazon Web Services From
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationAgency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
More informationImplementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
More informationowncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
More informationGoGrid Implement.com Configuring a SQL Server 2012 AlwaysOn Cluster
GoGrid Implement.com Configuring a SQL Server 2012 AlwaysOn Cluster Overview This documents the SQL Server 2012 Disaster Recovery design and deployment, calling out best practices and concerns from the
More informationMac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
More informationAT&T Synaptic Storage as a Service SM Getting Started Guide
AT&T Synaptic Storage as a Service SM Getting Started Guide Version 3.0 2011 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. All other
More informationEnsim WEBppliance 3.0 for Windows (ServerXchange) Release Notes
Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes May 07, 2002 Thank you for choosing Ensim WEBppliance 3.0 for Windows. This document includes information about the following: About Ensim
More informationWiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
More informationDeveloping ASP.NET MVC 4 Web Applications
Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools
More informationIntelligent, Scalable Web Security
Solution Overview Citrix and Trend Micro Intelligent, Scalable Web Security Application-Level Control, Load Balancing, High-Traffic Capacity Table of Contents The Challenge... 3 The Solution: Citrix NetScaler
More informationCisco Unified CM Disaster Recovery System
Disaster Recovery System, page 1 Quick-Reference Tables for Backup and Restore s, page 3 Supported Features and Components, page 4 System Requirements, page 5 Log In to Disaster Recovery System, page 7
More informationHow to Obtain an APNs Certificate for CA MDM
How to Obtain an APNs Certificate for CA MDM Contents How to Obtain an APNs Certificate for CA MDM Verify Prerequisites Obtaining Root and Intermediate Certificates Create a Certificate Signing Request
More informationHow to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
More informationSelling Digital Goods Online
PayLoadz.com Selling Digital Goods Online How to use the PayLoadz and PayPal services to sell digital goods on your web site Updated: 02/12/2006 TABLE OF CONTENTS INTRODUCTION...3 HOW IT WORKS...3 GETTING
More informationGetting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
More informationArchive Attender Version 3.5
Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,
More informationError Code Quick Reference Guide Updated 01/28/2015
Error Code Quick Reference Guide Updated 01/28/2015 Note: this list includes all error codes that may appear in TestNav across all states and some may not apply to Minnesota. 1/28/15 v.1.0 2 TestNav 7
More informationGRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationRightFax Internet Connector Frequently Asked Questions
RightFax Internet Connector Frequently Asked Questions What is the RightFax Internet Connector? The RightFax Internet Connector is a connector within RightFax 10.5 which provides an Internet connection
More informationDisaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.5(1)
Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.5(1) Published: Decemer 02, 2010 This guide provides an overview of the Disaster Recovery System, describes
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More information3M Command Center. Installation and Upgrade Guide
3M Command Center Installation and Upgrade Guide Copyright 3M, 2015. All rights reserved., 78-8129-3760-1d 3M is a trademark of 3M. Microsoft, Windows, Windows Server, Windows Vista and SQL Server are
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationSonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
More information