GRID COMPUTING Techniques and Applications BARRY WILKINSON
|
|
|
- Arron Lawrence
- 10 years ago
- Views:
Transcription
1 GRID COMPUTING Techniques and Applications BARRY WILKINSON
2 Contents Preface About the Author CHAPTER 1 INTRODUCTION TO GRID COMPUTING Grid Computing Concept History of Distributed Computing Computational Grid Applications Grid Computing Infrastructure Development 14 Large-Scale U.S. Grids 14 National Grids 16 Multi-National Grids 17 Campus Grids Grid Computing Courses Grid Computing Software Interface Summary 27 Further Reading 28 Bibliography 29 Self-Assessment Questions 31 Programming Assignments 32 vii
3 viii CONTENTS CHAPTER 2 JOB SUBMISSION Introduction Globus Job Submission 38 Components 38 Job Specification 41 Submitting a Job Transferring Files 55 Command-Line File Transfers 55 Staging Summary 59 Further Reading 59 Bibliography 59 Self-Assessment Questions 60 Programming Assignments 62 CHAPTER 3 SCHEDULERS Scheduler Features 65 Scheduling 65 Monitoring Job Progress 69 Additional Scheduler Features Scheduler Examples 75 Sun Grid Engine 75 Condor Grid Computing Meta-Schedulers 100 Condor-G 100 GridWay Distributed Resource Management Application (DRMAA) Summary 110 Further Reading 111 Bibliography 111 Self-Assessment Questions 112 Programming Assignments 114 CHAPTER 4 SECURITY CONCEPTS Introduction 117 Secure Connection 117 Password Authentication 118 Encryption and Decryption 119
4 CONTENTS ix 4.2 Symmetric Key Cryptography Asymmetric Key Cryptography (Public Key Cryptography) Public Key Infrastructure 128 Data Integrity 128 Digital Signatures 129 Certificates and Certificate Authorities Systems/Protocols Using Security Mechanisms 140 Mutual Authentication and Single-Sided Authentication 140 Secure Shell (SSH) 141 Secure Sockets Layer (SSL) Protocol Summary 144 Further Reading 144 Bibliography 144 Self-Assessment Questions 145 Programming Assignments 148 CHAPTER 5 GRID SECURITY Introduction 149 Grid Environment 149 Authentication and Authorization Aspects for a Grid Grid Security Infrastructure (GSI) 153 Component Parts 153 GSI Communication Protocols 154 GSI Authentication 156 GSI Authorization Delegation 164 The Need for Delegation 164 Proxy Certificates 165 MyProxy Grid Credential Repository Higher-Level Authorization Tools 170 Security Assertion Markup Language (SAML) 171 Using Certificates for Authorization Summary 174 Further Reading 175 Bibliography 175 Self-Assessment Questions 176 Programming Assignments 177
5 x CONTENTS CHAPTER 6 SYSTEM INFRASTRUCTURE I: WEB SERVICES Service-Oriented Architecture Web Services 181 Concept 181 Communication Protocols for Web Services 183 Defining a Web Service Interface WSDL 184 Service Registry Web Service Implementation 192 Web Service Containers 192 Building and Deploying a Service Summary 196 Further Reading 196 Bibliography 197 Self-Assessment Questions 197 Programming Assignments 199 CHAPTER 7 SYSTEM INFRASTRUCTURE II: GRID COMPUTING SERVICES Grid Computing and Standardization Bodies Interacting Grid Computing Components 202 Development of a Service-Oriented Approach 202 Stateful Web Services 203 Transient Services Open Grid Services Architecture (OGSA) 205 Purpose 205 Open Grid Services Infrastructure (OGSI) 205 WS-Resource Framework 206 Generic Stateful WSRF Service 209 Additional Features of WSRF/GT4 Services 213 Information Services Summary 219 Further Reading 219 Bibliography 219 Self-Assessment Questions 220 Programming Assignments 222
6 CONTENTS xi CHAPTER 8 USER-FRIENDLY INTERFACES Introduction Grid Computing Workflow Editors 224 Workflows 224 Workflow Editor Features 225 GridNexus Grid Portals 234 General Features 234 Available Technologies 236 Early Grid Portals 239 Development of Grid Portals with Portlets Summary 250 Further Reading 250 Bibliography 251 Self-Assessment Questions 252 Programming Assignments 255 CHAPTER 9 GRID-ENABLING APPLICATIONS Introduction 259 Definition of Grid Enabling 259 Types of Jobs to Grid Enable Parameter Sweep 261 Parameter Sweep Applications 261 Implementing Parameter Sweep Using an Existing Program on Multiple Grid Computers 265 Data Partitioning 265 Deploying Legacy Code 267 Exposing an Application as a Service Writing an Application Specifically for a Grid 269 Using Grid Middleware APIs 269 Higher Level Middleware-Independent APIs Using Multiple Grid Computers to Solve a Single Problem 271 Parallel Programming 271 Message-Passing Approach 272 Message-Passing Interface (MPI) 273 Grid-Enabled MPI 282 Grid Enabling MPI Programs Summary 288 Further Reading 288
7 xii CONTENTS Bibliography 288 Self-Assessment Questions 290 Programming Assignments 291 APPENDIX A INTERNET AND NETWORKING BASICS 293 APPENDIX B LINUX AND WINDOWS COMMAND-LINE INTERFACES 303 APPENDIX C XML MARKUP LANGUAGE 315 APPENDIX D GLOBUS INSTALLATION TUTORIAL 331 GLOSSARY 345 ANSWERS TO SELF-ASSESSMENT QUESTIONS 357 INDEX 359
An approach to grid scheduling by using Condor-G Matchmaking mechanism
An approach to grid scheduling by using Condor-G Matchmaking mechanism E. Imamagic, B. Radic, D. Dobrenic University Computing Centre, University of Zagreb, Croatia {emir.imamagic, branimir.radic, dobrisa.dobrenic}@srce.hr
Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4
Concepts and Architecture of the Grid Summary of Grid 2, Chapter 4 Concepts of Grid Mantra: Coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations Allows
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware
Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware R. Goranova University of Sofia St. Kliment Ohridski,
THE CCLRC DATA PORTAL
THE CCLRC DATA PORTAL Glen Drinkwater, Shoaib Sufi CCLRC Daresbury Laboratory, Daresbury, Warrington, Cheshire, WA4 4AD, UK. E-mail: [email protected], [email protected] Abstract: The project aims
XSEDE Service Provider Software and Services Baseline. September 24, 2015 Version 1.2
XSEDE Service Provider Software and Services Baseline September 24, 2015 Version 1.2 i TABLE OF CONTENTS XSEDE Production Baseline: Service Provider Software and Services... i A. Document History... A-
Abstract. 1. Introduction. Ohio State University Columbus, OH 43210 {langella,oster,hastings,kurc,saltz}@bmi.osu.edu
Dorian: Grid Service Infrastructure for Identity Management and Federation Stephen Langella 1, Scott Oster 1, Shannon Hastings 1, Frank Siebenlist 2, Tahsin Kurc 1, Joel Saltz 1 1 Department of Biomedical
Chapter 12 GRID SECURITY ARCHITECTURE: Requirements,fundamentals, standards, and models
Author manuscript, published in Security in Distributed, Grid, Mobile, and Pervasive Computing, Auerbach Publications, pp. 255-288, April, 2007 https://www.nics.uma.es Security in Distributed, Grid, and
DISTRIBUTED SYSTEMS SECURITY
DISTRIBUTED SYSTEMS SECURITY Issues, Processes and Solutions Abhijit Belapurkar, Yahoo! Software Development India Pvt. Ltd., India Anirban Chakrabarti, Infosys Technologies Ltd., India Harigopal Ponnapalli,
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
Contents at a Glance. 1 Introduction 17. 2 Basic Principles of IT Security 23. 3 Authentication and Authorization in
at a Glance 1 Introduction 17 2 Basic Principles of IT Security 23 3 Authentication and Authorization in SAP NetWeaver Application Server Java 53 4 Single Sign-On 151 5 Identity Provisioning 289 6 Secure
Certificates in a Nutshell. Jens Jensen, STFC Leader of EUDAT AAI TF
Certificates in a Nutshell Jens Jensen, STFC Leader of EUDAT AAI TF In a nutshell... Mature, Robust, Ubiquitous Have been around for decades Interoperable supported by every OS, every language Used everywhere
2 Transport-level and Message-level Security
Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective The Globus Security Team 1 Version 4 updated September 12, 2005 Abstract This document provides an overview of the Grid Security
Grid Security : Authentication and Authorization
Grid Security : Authentication and Authorization IFIP Workshop 2/7/05 Jong Kim Dept. of Computer Sci. and Eng. Pohang Univ. of Sci. and Tech. (POSTECH) Contents Grid Security Grid Security Challenges Grid
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
HPC and Grid Concepts
HPC and Grid Concepts Divya MG ([email protected]) CDAC Knowledge Park, Bangalore 16 th Feb 2012 GBC@PRL Ahmedabad 1 Presentation Overview What is HPC Need for HPC HPC Tools Grid Concepts GARUDA Overview
Cluster, Grid, Cloud Concepts
Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of
CSF4:A WSRF Compliant Meta-Scheduler
CSF4:A WSRF Compliant Meta-Scheduler Wei Xiaohui 1, Ding Zhaohui 1, Yuan Shutao 2, Hou Chang 1, LI Huizhen 1 (1: The College of Computer Science & Technology, Jilin University, China 2:Platform Computing,
GridWay: Open Source Meta-scheduling Technology for Grid Computing
: Open Source Meta-scheduling Technology for Grid Computing Ruben S. Montero dsa-research.org Open Source Grid & Cluster Oakland CA, May 2008 Contents Introduction What is? Architecture & Components Scheduling
Globus Toolkit: Authentication and Credential Translation
Globus Toolkit: Authentication and Credential Translation JET Workshop, April 14, 2004 Frank Siebenlist [email protected] http://www.globus.org/ Copyright (c) 2002 University of Chicago and The University
GSI Credential Management with MyProxy
GSI Credential Management with MyProxy GGF8 Production Grid Management RG Workshop June 26, 2003 Jim Basney [email protected] http://myproxy.ncsa.uiuc.edu/ MyProxy Online repository of encrypted GSI
Grid Computing With FreeBSD
Grid Computing With FreeBSD USENIX ATC '04: UseBSD SIG Boston, MA, June 29 th 2004 Brooks Davis, Craig Lee The Aerospace Corporation El Segundo, CA {brooks,lee}aero.org http://people.freebsd.org/~brooks/papers/usebsd2004/
MOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
An Online Credential Repository for the Grid: MyProxy
An Online Credential Repository for the Grid: MyProxy Jason Novotny Lawrence Berkeley Laboratory [email protected] Steven Tuecke Mathematics and Computer Science Division Argonne National Laboratory [email protected]
Using the MyProxy Online Credential Repository
Using the MyProxy Online Credential Repository Jim Basney National Center for Supercomputing Applications University of Illinois [email protected] What is MyProxy? Independent Globus Toolkit add-on
Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.
New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Architectures, and. Service-Oriented. Cloud Computing. Web Services, The Savvy Manager's Guide. Second Edition. Douglas K. Barry. with.
Web Services, Service-Oriented Architectures, and Cloud Computing The Savvy Manager's Guide Second Edition Douglas K. Barry with David Dick ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS
Angel Dichev RIG, SAP Labs
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine SSL
IBM Solutions Grid for Business Partners Helping IBM Business Partners to Grid-enable applications for the next phase of e-business on demand
PartnerWorld Developers IBM Solutions Grid for Business Partners Helping IBM Business Partners to Grid-enable applications for the next phase of e-business on demand 2 Introducing the IBM Solutions Grid
TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES
TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES Xiaoyu Li a and Maree Pather b a Department of Information Technology, Nelson Mandela Metropolitan University b Department of Applied
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
e-science Technologies in Synchrotron Radiation Beamline - Remote Access and Automation (A Case Study for High Throughput Protein Crystallography)
Macromolecular Research, Vol. 14, No. 2, pp 140-145 (2006) e-science Technologies in Synchrotron Radiation Beamline - Remote Access and Automation (A Case Study for High Throughput Protein Crystallography)
The Lattice Project: A Multi-Model Grid Computing System. Center for Bioinformatics and Computational Biology University of Maryland
The Lattice Project: A Multi-Model Grid Computing System Center for Bioinformatics and Computational Biology University of Maryland Parallel Computing PARALLEL COMPUTING a form of computation in which
Praseeda Manoj Department of Computer Science Muscat College, Sultanate of Oman
International Journal of Electronics and Computer Science Engineering 290 Available Online at www.ijecse.org ISSN- 2277-1956 Analysis of Grid Based Distributed Data Mining System for Service Oriented Frameworks
An IDL for Web Services
An IDL for Web Services Interface definitions are needed to allow clients to communicate with web services Interface definitions need to be provided as part of a more general web service description Web
Cloud Platform for VPH Applications
Cloud Platform for VPH Applications Marian Bubak, Piotr Nowakowski, and Marek Kasztelnik ACC Cyfronet AGH Krakow and WP2 Team of Project dice.cyfronet.pl/projects/ www.vph-share.eu (No 269978) Outline
Integration strategy
C3-INAD and ESGF: Integration strategy C3-INAD Middleware Team: Stephan Kindermann, Carsten Ehbrecht [DKRZ] Bernadette Fritzsch [AWI] Maik Jorra, Florian Schintke, Stefan Plantikov [ZUSE Institute] Markus
Inca User-level Grid Monitoring
Inca User-level Grid Monitoring Shava Smallen [email protected] SC 09 November 17, 2009 Goal: reliable grid software and services for users Over 750 TF Over 30 PB of online and archival data storage Connected
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
TUTORIAL. Rebecca Breu, Bastian Demuth, André Giesler, Bastian Tweddell (FZ Jülich) {r.breu, b.demuth, a.giesler, b.tweddell}@fz-juelich.
TUTORIAL Rebecca Breu, Bastian Demuth, André Giesler, Bastian Tweddell (FZ Jülich) {r.breu, b.demuth, a.giesler, b.tweddell}@fz-juelich.de September 2006 Outline Motivation & History Production UNICORE
Grid Computing @ Sun Carlo Nardone. Technical Systems Ambassador GSO Client Solutions
Grid Computing @ Sun Carlo Nardone Technical Systems Ambassador GSO Client Solutions Phases of Grid Computing Cluster Grids Single user community Single organization Campus Grids Multiple user communities
Securing Web Services with WS-Security
Securing Web Services with WS-Security Demystifying WS-Security, WS-Policy, SAML, XML Signature and XML Encryption jothy Rosenberg David L. Remy SAMS Sams Publishing, 800 East 96th Street, Indianapolis,
Using WS-Federation and WS-Security for Identity Management in Virtual Organisations
Using WS-Federation and WS-Security for Identity Management in Virtual Organisations Demchenko, Yu. , Universiteit van Amsterdam Abstracts The paper provides insight into one of key
Module 1: e- Learning
Module 1: e- Learning SECTION 1: OVERVIEW... 2 PRIMER ON INFORMATION TECHNOLOGY, IS INFRASTRUCTURE AND EMERGING TECHNOLOGIES (12%) E-LEARNING... 2 Objective Objective:... 2 Task Statements... 2 Knowledge
The OMII Software Distribution
The OMII Software Distribution Justin Bradley, Christopher Brown, Bryan Carpenter, Victor Chang, Jodi Crisp, Stephen Crouch, David de Roure, Steven Newhouse, Gary Li, Juri Papay, Claire Walker, Aaron Wookey
LBSEC. http://www.liveboxcloud.com
2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee
GridSpeed: A Web-based Grid Portal Generation Server
GridSpeed: A Web-based Grid Portal Generation Server Toyotaro Suzumura Tokyo Institute of Technology, and Japan Society for the Promotion of Science [email protected] Satoshi Matsuoka Tokyo Institute
Introduction. MCSN N. Tonellotto Complements of Distributed Enabling Platforms
Introduction 1 Distributed relating to a computer network in which at least some of the processing is done by the individual computers and information is shared by and often stored at the computers Enabling
Cloud Computing. Implementation, Management, and Security. John W. Rittinghouse James F. Ransome
Cloud Computing Implementation, Management, and Security John W. Rittinghouse James F. Ransome ( r öc) CRC Press W / Taylor &. Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor
Grid Scheduling Architectures with Globus GridWay and Sun Grid Engine
Grid Scheduling Architectures with and Sun Grid Engine Sun Grid Engine Workshop 2007 Regensburg, Germany September 11, 2007 Ignacio Martin Llorente Javier Fontán Muiños Distributed Systems Architecture
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
Rights Management Services
www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
SSDG Operational Manual Draft version: 0.1. Operational Manual For SSDG
Operational Manual For SSDG 1 Table of Contents ABBREVIATIONS... 5 SECTION 1: INTRODUCTION... 6 1 INTRODUCTION... 7 1.1 INTENDED USER... 7 1.2 HOW TO USE... 7 1.3 ORGANIZATION OF THE MANUAL... 8 1.4 HELPDESK...
RFP 95200, City-Wide Electronic/Digital Signature Solution. Vendor Questions (AFTER Pre-Proposal Conference on March 17, 2015) and Answers (in bold)
RFP 95200, City-Wide Electronic/Digital Signature Solution Vendor Questions (AFTER Pre-Proposal Conference on March 17, 2015) and Answers (in bold) Proposal Due Date: Monday, April 6, 2015 1. Per the RFP,
Lukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.
ORACLE Oracle Press Oracle Fusion Middleware 11 g Architecture and Management Reza Shafii Stephen Lee Gangadhar Konduri Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
/ Preparing to Manage a VMware Environment Page 1
Configuring Security for a Managed VMWare Enviroment in VMM Preparing to Manage a VMware Environment... 2 Decide Whether to Manage Your VMware Environment in Secure Mode... 2 Create a Dedicated Account
OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH
OOo Digital Signatures Malte Timmermann Technical Architect Sun Microsystems GmbH About the Speaker Technical Architect in OpenOffice.org/StarOffice development OOo/StarOffice developer since 1991/94 Main
TIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012
TIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
GSiB: PSE Infrastructure for Dynamic Service-oriented Grid Applications
GSiB: PSE Infrastructure for Dynamic Service-oriented Grid Applications Yan Huang Department of Computer Science Cardiff University PO Box 916 Cardiff CF24 3XF United Kingdom [email protected]
Smart Card Application Development Using Java
Uwe Hansmann Martin S. Nicklous Thomas Schack Frank Seliger Smart Card Application Development Using Java With 98 Figures, 16 Tables and a Multi Function Smart Card Springer Table of Contents Preface 1
Tim Bovles WILEY. Wiley Publishing, Inc.
Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5
e-gov Architecture Architectural Blueprint
Introduction 2 4 Introduction...4 Service Oriented Architecture...4 Security...6 Authentication 8 Authorization 10 Integration... 11 Service Bus 12 Orchestration 13 Discovery... 15 Monitoring... 17 Auditing
Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction
Acknowledgments xv About the Author xvii Introduction xix Part 1 SSH Basics 1 Chapter 1 Overview of SSH 3 Differences between SSH1 and SSH2 4 Various Uses of SSH 5 Security 5 Remote Command Line Execution
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明
Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic
An Introduction to Globus Toolkit 3
An Introduction to Globus Toolkit 3 -Developing Interoperable Grid services 1 Outline Cornerstones New Concepts Software Stack Core Higher Level Services Developing and Using Grid Services Development
GT 6.0 GRAM5 Key Concepts
GT 6.0 GRAM5 Key Concepts GT 6.0 GRAM5 Key Concepts Overview The Globus Toolkit provides GRAM5: a service to submit, monitor, and cancel jobs on Grid computing resources. In GRAM, a job consists of a computation
SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT
SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT Foreword by Prof. Wolfgang Lassmann... 15 Foreword by Dr. Sachar Paulus... 17 1 Introduction...
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements
SAS 9.3 Intelligence Platform
SAS 9.3 Intelligence Platform Application Server Administration Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. SAS SAS 9.3 Intelligence
