A Distributed Grid Service Broker for Web-Services Based Grid Applications

Size: px
Start display at page:

Download "A Distributed Grid Service Broker for Web-Services Based Grid Applications"

Transcription

1 A Distributed Grid Service Broker for Web-Services Based Grid Applications Dr. Yih-Jiun Lee Mr. Kai-Wen Lien Dept. of Information Management, Chien Kuo Technology University, Taiwan Web-Service NASA IDGEURO Data Grid GT Web-Service light-weight Service-Oriented reliability Service Web-Services Based Service broker (3~5 ) Abstract Grid computing enables the cooperation of virtual organizations (Foster, 2003). It involves distributed resources sharing within coordinators. A grid user can submit tasks to access resources at different locations. This research is based on a fully distributed grid system, composed of nodes, in which users or proxies may have difficulty finding proper space to execute. The aim of this research is providing a grid service broker, which can find appropriate spaces for users and tasks without harming security. A distributed grid portal will also be provided as a byproduct. Keywords: Service-Oriented Architecture, Grid Computing, Web-Services 518

2 1 INTRODUCTION Script-I, including a set of web-services, is a services-oriented grid computing system, composed of nodes (Lee, ). Script-I is based on Node-to-Node computing, which refers a server to a node. A node, also a resource provider and a place where computation happens, has Script-I web services installed to support grid execution and serves many users. The virtual organizations in a Script-I system are constructed around nodes and users in a many-to-many relation. Because every node is independent and the system is fully distributed, finding a proper executive space is a problem. Most current brokers are supposed to be trustworthy, so users can pass tasks through the broker without worrying task falsification. Moreover, most of them act as central components in the system to allocate tasks to job executors. The challenge of this research is to introduce a broker component, without compromising the security and privacy of users, and keeping the system distributed. 1.1 THE EVOLUTION OF DISTRIBUTED COMPUTING The predecessor of distributed computing was the Client-server architecture, first used in the 1980s (Schussel, 1995). Client-server architecture sorted all the participants (computers) in the whole system into two groups, clients or servers. A server in a client-server system is a computer with much higher power, better performa nce and connectivity, and can execute over a long period of time. A server can serve more than one client at a time, following their requests. On the other hand, a client (which might be personal computers) has usually a single processor and less powerful, with less resources. Clients can send requests to servers, which process without any further outside assistance (at least from the point of view of the requesters). The job of the client (the requester) is to pre-process and prepare a task, and send a request to the server for service. This architecture is very useful for two or three-tier business applications. However, there is frequently a performance and reliability bottleneck when requests run at a peak. With the evolution of network infrastructures and the enhancement of the computational power of personal computers, Peer-to-Peer (P2P) computing provides another model of distributed computing, in which the computing devices (computers, servers, or all other devices) can link to each other easily and directly. Each device is called a Peer and communication or sharing occurs between two peers. A peer can play the role of both client and server, unlike in server-centric computing (in.net Glossary of Terms, Microsoft glossary, 2004). This is termed an asymmetric client-server system (Foster and Kesselman, 2003). P2P computing is typically used for connecting hosts and sharing resources (particularly, various types of files). The main purpose of P2P is that resources can be provided and consumed by every peer. Compared with a client-server system in which only servers provide resources, P2P is more robust and reliable. However, a P2P computing system cannot differentiate the privileges of different users. Thus, control is lacking. 519

3 The idea of Node-to-Node computing (N2N) (Lee, ; Lee, 2006) is different. A node is denoted as a server and basic atom in the execution environment. A node is also an individual environment where computation occurs. There are services running on nodes, each of which might serve different tasks. Services can communicate to each other through message passing or service invocations. Therefore, communication occurs between two services or two nodes. In contrast to P2P computing, N2N computing can provide wider usage, more functionality and different services. 2 CURRENT SYSTEM STATUS This section describes current achievements as regards security fulfilments. 2.1 SYSTEM INTRODUCTION WSGrid involves the idea of Node-to-Node Computing (abbreviated to N2N computing). N2N computing derives from Peer-to-Peer Computing. It is also a new architecture in distributed computing. The structure of N2N computing is shown in Figure 1. It is very similar to P2P computing. However, N2N provides higher controllability. Each participant has equal position in P2P computing, but in N2N computing, the trust status of participants can be separately configured. Figure 1. The structure of Node-to-Node Computing It is also shown in Figure 1, that every node (participant) might connect to each other. The graph is fully connected. However, in the real situation, a node can only connect to nodes, which the current invoker has the privilege to access to. Thus, the connection might be varied, even for different users. The virtual organization in Script-I is formed by nodes and users, (actually, the relation between nodes and users). For instance, Alice and Bob are users on NodeA; Bob and Charlie are users on NodeB; Alice, Bob and Charlie are all able to access NodeC. Thus, Alice can 520

4 access to NodeA and Node C; Bob can access to NodeA, NodeB and NodeC; Charlie can access to NodeB and NodeC. When Alice delegates part of her rights to Charlie, Charlie might now have the privilege to request a service or resource on NodeA, even he is not a legal member on NodeA. This delegation might be disabled when Alice sees fit. The virtual organization can be formed and changed dynamically. 2.2 CURRENT METHOD OF LOCATING SERVICES In the current system, a user might own different spaces on different nodes. Any workflow might require files access or collection. Thus, to know where to locate files and services is an issue. The former must be artificially provided; and the latter can be acquired by accessing available services list of the web-services container. Because the services provided by different nodes might change dynamically, the user must check the lists of different nodes before submissions. However, the current executive state cannot be acknowledged. Thus, the user might expect a result coming from a service which is already in deadlock. 2.3 CURRENT SECURITY PROCEDURES Authentication and authorization are always the primary concerns in any distributed system. In Script-I, one node may serve more than one user, so the node administrator allocates a personal workspace to every user, accessible only to its owner. A user can only be authorized to access the workspace by authentication of credentials (identities). The credential, which has to be attached at each access, is a security token in varied types. The invoked service can only serve the user if the token is validated. Resource sharing and Single Sign-On (SSO) in Script-I is achieved by GateService. To enable partial rights delegation, a shorter-life token must be issued by the delegator, containing permitted action and effective domain, and passed to the delegatee. The SSO service is for users who hold identities on nodes to automatically go through authentications which happen in one transaction or in a reasonable period. 2.4 PROBLEM SCOPE AND EVALUATION RESULT The full distributed Script-I environment has no central component or portal. Task distribution and job executive location depend on the user s manual configuration. However, it is difficult to determine service locations and their current execution states. Thus, a user or proxy might send a task to an unavailable job executor causing program starving. The aim of this research is to produce a grid service broker for a distributed system without affecting system flexibility. The grid broker is usually suspended to reduce computation cost, but awoken on user demand. The functionalities of the broker are (1) to retrieve the nodes available to the requester, (2) to compile a list containing available services on those nodes according to user requirements, (3) to request the current state of appropriate services and 521

5 nodes, (4) to decide or counsel the submitter about where to execute, (4) to send the tasks to those available services, and (5) to notify the requester regarding his submission or result. Moreover, to enhance user security, different security levels will also be provided for code authentication to avoid code falsification. In addition, a grid service portal is also provided. The portal does not run on a particular node as a central component in other grid systems, but can be selected by each user. With the SSO service in GateService and broker service, the user can define a proper node to be his grid portal. Since the portals chosen by users might be located on different nodes, the system keeps its flexibility (no centralized component) and reduces the possibility of bottleneck. 3 THE SYSTEM AND SERVICES Script-I is a set of web-services, built on top of Tomcat as a web container and AXIS as a web-services container. It is implemented using Java, and JAX-RPC and using SOAP and XML to format messages. This section introduces the services and their functionalities. 3.1 THE BASIC FUNCTIONALITIES Script-I is a set of web-services, built on top of Tomcat as a web container and AXIS as a web-services container. It is implemented using Java, and JAX-RPC and using SOAP and XML to format messages. This section introduces the services and their functionalities. a. FileService FileService is used to move objects from one location to another. IndiGrid allows remote access only to certain locations to prevent possible attacks. The owner can move all his objects to where he has privileges to access. In order to maintain the consistency of distributed objects, the moved objects can be marked with their life-time and the out-of-date objects can be erased to ensure the number of duplicates. FileService usually cooperates with other services. There is only one precondition here: in order to access to a location, the requester must show that he has the privilege to access. Therefore, he needs to attach his certificate to prove his identity along with the request. b. JobService JobService is a task submission service to allow the owner, who wants to submit a task to another device. This service aims to balance the computation load and uses some resources on certain locations. The user sends a job along with the job requirements, so the remote service can execute it. The post-execution process is varied, depending on what mentions in the description file. To allow a remote task to process on the server, security is always the risk. To protect the system, the submission is only allowed to access the storage space, which is specified on the certificate. 522

6 c. LoggingService LoggingService is used to record the status of the execution and servers. It can also be sued as a task-status-query service. The LoggingService can be invoked either in the job description file, or in the job itself. For instance, a user might specify a log must be sent to mark the time and place of the submission; he might also want to know when to finish the execution, that is to invoke the LoggingServer at the end of the task. d. DelegationService DelegationService allows the user to issue a temporary passport to someone he trusts. This service follows the idea of GateService (Lee, 2005), but provides more powerful and useful description to protect users privacy. To allow a trusted user to access to your resource, the user (delegator) must issue a temporary token (a short-lived certificate), which must be unique to the issuer. The delegatee must request the services along with the token, where specifies the actions and domains he is allowed to access to. The life time of the token is flexible, up to the issuer. A delegation can be withdrawn automatically (when the expired date is expired) or manually (when the idelegator believes the delegation is no longer necessary). 3.2 BROKERSERVICE BrokerService is the last service in Script-I. It is also the most important service. Since the whole virtual community is fully distributed, there is no central component to manage the status of services or nodes. How can a user know that where and which service is available? How can a user determine where to submit the task? BrokerService makes the suggestion. In order to gather current service status of nodes, BrokerService aims to collect all necessary information and makes decisions. The related information is written in an XML format, called status request and status response. Two message sequences- push and pull, are used. The former mentions that every node member must automatically broadcast a status response message to every friend it knows. The push method can be used at service initiation, service shutdown, too busy and back to normal status, so the receiver can decide whether the sender should be added into or withdrawn from the available list. The latter sequence method is to request the status from friends or a specific node, when a particular task (a computation based process) is initiated. To serve a long-running task, the up to date service status is very important. Thus, the leader node must request for status updating. When a node is receiving a status request, it must check its waiting list and self-check its own status. A status response message is 523

7 generated and replied. The pull method is usually used when the current status list is suspicious (for instance, it has not been updated for a long time) or a long-running task is going to submit. No matter which method to be used, the post-process is the same. After receiving the responses, parsing all information from status response messages, it can mark those nodes which do not reply the request as unavailable and then compile a new available list according to information message in the message. Thus, the most available node can be chosen for the task. 4 CONCLUSION Usually, it is considered that how frequent synchronization should be performed. When synchronization often happens, network bandwidth is occupied by system messages and available lists are often compiled. Then performance of the whole system might be affected. On the other hand, if the synchronization process is seldom performed, the nodes status might be incorrect and the broker may choose an inappropriate executor. BrokerService tries to keep the balance between up-to-date status and cost-wasting by using both push and pull methods. However, it is possible that job holders want to point out where to submit. The system provides high flexibility for this kind of user requirements, which should be specified in the job description files. Therefore, where to execute the task can be chosen by either the broker or the submitter himself. Unlike other projects, the service broker has different architecture (compared with the broker of the Gridbus project), which hides the complexity of grids by transforming user requirements into a set of jobs that are scheduled on the appropriate resources, managing them and collecting results when they are finished (Venugopal, 2004). Our broker is a web service, executed on behalf of users, but not directly access submissions. The submitter will be able to choose different levels security to protect his tasks and data against eavesdropping and falsification. Finally, a distributed grid portal is provided as a byproduct. The portal is not a particular node or a central component, like MyProxy (Novotny, 2001). The portal is actually a service which can be running at anywhere. However, it does provide a magic gate. A user can access to all resources (with permission) via the gate without bothering authentication. Single Sign-On is involved. Thus, the system is still distributed and its flexibility remains. Reference 1. Novotny, J., Tuecke, S., Welch, V., (2001). An Online Credential Repository for the Grid: 524

8 MyProxy, the tenth HPDC, August 2. Foster, I., & Kesselman, C., (2003). The Grid 2: Blueprint for a New Computing Infrastructure, Morgan Kaufmann 3. Lee, Yih-Jiun. (2005.1). A Security Solution for Web-Services Based Virtual Organizations, IRMA 2005, San Diego, USA, May 4. Venugopal S., Buyya B., Winton L., (2004). A Grid Service Broker for Scheduling Distributed Data-Oriented Applications on Global Grids, Technical Report, Grid Computing and Distributed Systems, University of Melbourne, Australia 5. Lee, Yih-Jiun. (2005.2) A dynamic virtual organization solution for web-services based grid middleware, in The NBiS workshop, in conjunction with 2005 DEXA International Conference,Copenhagen, Denmark, Aug Schussel, G. (1995). Client/server past, present, and future, Lee, Yih-Jiun., (2006) PhD Thesis: Models of Workflow in Grid Systems with applications to security and mobile code, University of Southampton, Southampton, UK, June,

Grid Delegation Protocol

Grid Delegation Protocol UK Workshop on Grid Security Experiences, Oxford 8th and 9th July 2004 Grid Delegation Protocol Mehran Ahsant a, Jim Basney b and Olle Mulmo a a Center for Parallel Computers,Royal Institute of Technology,

More information

IGI Portal architecture and interaction with a CA- online

IGI Portal architecture and interaction with a CA- online IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following

More information

Abstract. 1. Introduction. Ohio State University Columbus, OH 43210 {langella,oster,hastings,kurc,saltz}@bmi.osu.edu

Abstract. 1. Introduction. Ohio State University Columbus, OH 43210 {langella,oster,hastings,kurc,saltz}@bmi.osu.edu Dorian: Grid Service Infrastructure for Identity Management and Federation Stephen Langella 1, Scott Oster 1, Shannon Hastings 1, Frank Siebenlist 2, Tahsin Kurc 1, Joel Saltz 1 1 Department of Biomedical

More information

TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES

TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES Xiaoyu Li a and Maree Pather b a Department of Information Technology, Nelson Mandela Metropolitan University b Department of Applied

More information

An approach to grid scheduling by using Condor-G Matchmaking mechanism

An approach to grid scheduling by using Condor-G Matchmaking mechanism An approach to grid scheduling by using Condor-G Matchmaking mechanism E. Imamagic, B. Radic, D. Dobrenic University Computing Centre, University of Zagreb, Croatia {emir.imamagic, branimir.radic, dobrisa.dobrenic}@srce.hr

More information

Distributed Systems and Recent Innovations: Challenges and Benefits

Distributed Systems and Recent Innovations: Challenges and Benefits Distributed Systems and Recent Innovations: Challenges and Benefits 1. Introduction Krishna Nadiminti, Marcos Dias de Assunção, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory Department

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

G-Monitor: Gridbus web portal for monitoring and steering application execution on global grids

G-Monitor: Gridbus web portal for monitoring and steering application execution on global grids G-Monitor: Gridbus web portal for monitoring and steering application execution on global grids Martin Placek and Rajkumar Buyya Grid Computing and Distributed Systems (GRIDS) Lab Department of Computer

More information

A Model for Access Control Management in Distributed Networks

A Model for Access Control Management in Distributed Networks A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,

More information

Grid Security : Authentication and Authorization

Grid Security : Authentication and Authorization Grid Security : Authentication and Authorization IFIP Workshop 2/7/05 Jong Kim Dept. of Computer Sci. and Eng. Pohang Univ. of Sci. and Tech. (POSTECH) Contents Grid Security Grid Security Challenges Grid

More information

Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4

Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4 Concepts and Architecture of the Grid Summary of Grid 2, Chapter 4 Concepts of Grid Mantra: Coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations Allows

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

USING FEDERATED AUTHENTICATION WITH M-FILES

USING FEDERATED AUTHENTICATION WITH M-FILES M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication

More information

GSiB: PSE Infrastructure for Dynamic Service-oriented Grid Applications

GSiB: PSE Infrastructure for Dynamic Service-oriented Grid Applications GSiB: PSE Infrastructure for Dynamic Service-oriented Grid Applications Yan Huang Department of Computer Science Cardiff University PO Box 916 Cardiff CF24 3XF United Kingdom Yan.Huang@cs.cardiff.ac.uk

More information

THE CCLRC DATA PORTAL

THE CCLRC DATA PORTAL THE CCLRC DATA PORTAL Glen Drinkwater, Shoaib Sufi CCLRC Daresbury Laboratory, Daresbury, Warrington, Cheshire, WA4 4AD, UK. E-mail: g.j.drinkwater@dl.ac.uk, s.a.sufi@dl.ac.uk Abstract: The project aims

More information

Authorization Strategies for Virtualized Environments in Grid Computing Systems

Authorization Strategies for Virtualized Environments in Grid Computing Systems Authorization Strategies for Virtualized Environments in Grid Computing Systems Xinming Ou Anna Squicciarini Sebastien Goasguen Elisa Bertino Purdue University Abstract The development of adequate security

More information

G-Monitor: A Web Portal for Monitoring and Steering Application Execution on Global Grids

G-Monitor: A Web Portal for Monitoring and Steering Application Execution on Global Grids G-Monitor: A Web Portal for Monitoring and Steering Application Execution on Global Grids Martin Placek and Rajkumar Buyya Grid Computing and Distributed Systems (GRIDS) Laboratory Department of Computer

More information

Secure Federated Light-weight Web Portals for FusionGrid

Secure Federated Light-weight Web Portals for FusionGrid Secure Federated Light-weight Web Portals for FusionGrid By: D. Aswath, M. Thompson, M. Goode, X. Lee, N. Y. Kim Presented by: Dipti Aswath GCE Workshop 2006 Second International Workshop on Grid Computing

More information

An Online Credential Repository for the Grid: MyProxy

An Online Credential Repository for the Grid: MyProxy An Online Credential Repository for the Grid: MyProxy Jason Novotny Lawrence Berkeley Laboratory JDNovotny@lbl.gov Steven Tuecke Mathematics and Computer Science Division Argonne National Laboratory tuecke@mcs.anl.gov

More information

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using

More information

Multilingual Interface for Grid Market Directory Services: An Experience with Supporting Tamil

Multilingual Interface for Grid Market Directory Services: An Experience with Supporting Tamil Multilingual Interface for Grid Market Directory Services: An Experience with Supporting Tamil S.Thamarai Selvi *, Rajkumar Buyya **, M.R. Rajagopalan #, K.Vijayakumar *, G.N.Deepak * * Department of Information

More information

Web Service Robust GridFTP

Web Service Robust GridFTP Web Service Robust GridFTP Sang Lim, Geoffrey Fox, Shrideep Pallickara and Marlon Pierce Community Grid Labs, Indiana University 501 N. Morton St. Suite 224 Bloomington, IN 47404 {sblim, gcf, spallick,

More information

REQUEST FOR INFORMATION. Identity and Access Management Administration Software RFI 2012-44

REQUEST FOR INFORMATION. Identity and Access Management Administration Software RFI 2012-44 REQUEST FOR INFORMATION FOR Identity and Access Management Administration Software RFI 2012-44 Florida Department of Education 325 West Gaines Street Tallahassee, Florida 32399-0400 Please email submissions

More information

Research and Implementation of Single Sign-On Mechanism for ASP Pattern *

Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

2 Transport-level and Message-level Security

2 Transport-level and Message-level Security Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective The Globus Security Team 1 Version 4 updated September 12, 2005 Abstract This document provides an overview of the Grid Security

More information

PROGRESS Portal Access Whitepaper

PROGRESS Portal Access Whitepaper PROGRESS Portal Access Whitepaper Maciej Bogdanski, Michał Kosiedowski, Cezary Mazurek, Marzena Rabiega, Malgorzata Wolniewicz Poznan Supercomputing and Networking Center April 15, 2004 1 Introduction

More information

Software Architecture Document

Software Architecture Document Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural

More information

A Peer-to-Peer Approach to Content Dissemination and Search in Collaborative Networks

A Peer-to-Peer Approach to Content Dissemination and Search in Collaborative Networks A Peer-to-Peer Approach to Content Dissemination and Search in Collaborative Networks Ismail Bhana and David Johnson Advanced Computing and Emerging Technologies Centre, School of Systems Engineering,

More information

eservices for Hospital Equipment

eservices for Hospital Equipment eservices for Hospital Equipment Merijn de Jonge 1, Wim van der Linden 1, and Rik Willems 2 1 Healthcare Systems Architecture Philips Research, The Netherlands 2 Strategy and Innovation Management/Technical

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

IVOA Single Sign-On security

IVOA Single Sign-On security IVOA Single Sign-On security Guy Rixon Presentation to ACCIS meeting Caltech, February 2007 Grid of secured services VOSpace App-server Restricted archive IVOA SSO, ACCIS meeting, February 2007 2 Client-server

More information

Classic Grid Architecture

Classic Grid Architecture Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes

More information

GSI Credential Management with MyProxy

GSI Credential Management with MyProxy GSI Credential Management with MyProxy GGF8 Production Grid Management RG Workshop June 26, 2003 Jim Basney jbasney@ncsa.uiuc.edu http://myproxy.ncsa.uiuc.edu/ MyProxy Online repository of encrypted GSI

More information

Managing Credentials with

Managing Credentials with Managing Credentials with MyProxy Jim Basney National Center for Supercomputing Applications University of Illinois jbasney@ncsa.uiuc.edu http://myproxy.ncsa.uiuc.edu/ What is MyProxy? A service for managing

More information

and Deployment Roadmap for Satellite Ground Systems

and Deployment Roadmap for Satellite Ground Systems A Cloud-Based Reference Model and Deployment Roadmap for Satellite Ground Systems 2012 Ground System Architectures Workshop February 29, 2012 Dr. Craig A. Lee The Aerospace Corporation The Aerospace Corporation

More information

Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware

Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware R. Goranova University of Sofia St. Kliment Ohridski,

More information

Using the Grid for the interactive workflow management in biomedicine. Andrea Schenone BIOLAB DIST University of Genova

Using the Grid for the interactive workflow management in biomedicine. Andrea Schenone BIOLAB DIST University of Genova Using the Grid for the interactive workflow management in biomedicine Andrea Schenone BIOLAB DIST University of Genova overview background requirements solution case study results background A multilevel

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

Grid Technology and Information Management for Command and Control

Grid Technology and Information Management for Command and Control Grid Technology and Information Management for Command and Control Dr. Scott E. Spetka Dr. George O. Ramseyer* Dr. Richard W. Linderman* ITT Industries Advanced Engineering and Sciences SUNY Institute

More information

Execution Management: Key Concepts

Execution Management: Key Concepts Execution Management: Key Concepts Execution Management: Key Concepts Overview The Globus Toolkit provides a service to submit, monitor, and cancel jobs on Grid computing resources called GRAM. In GRAM,

More information

GT 6.0 GRAM5 Key Concepts

GT 6.0 GRAM5 Key Concepts GT 6.0 GRAM5 Key Concepts GT 6.0 GRAM5 Key Concepts Overview The Globus Toolkit provides GRAM5: a service to submit, monitor, and cancel jobs on Grid computing resources. In GRAM, a job consists of a computation

More information

AN APPROACH TO DEVELOPING BUSINESS PROCESSES WITH WEB SERVICES IN GRID

AN APPROACH TO DEVELOPING BUSINESS PROCESSES WITH WEB SERVICES IN GRID AN APPROACH TO DEVELOPING BUSINESS PROCESSES WITH WEB SERVICES IN GRID R. D. Goranova 1, V. T. Dimitrov 2 Faculty of Mathematics and Informatics, University of Sofia S. Kliment Ohridski, 1164, Sofia, Bulgaria

More information

Designing an Enterprise Application Framework for Service-Oriented Architecture 1

Designing an Enterprise Application Framework for Service-Oriented Architecture 1 Designing an Enterprise Application Framework for Service-Oriented Architecture 1 Shyam Kumar Doddavula, Sandeep Karamongikar Abstract This article is an attempt to present an approach for transforming

More information

Context-Aware Access Control for Pervasive Access to Process-Based Healthcare Systems

Context-Aware Access Control for Pervasive Access to Process-Based Healthcare Systems ehealth Beyond the Horizon Get IT There S.K. Andersen et al. (Eds.) IOS Press, 2008 2008 Organizing Committee of MIE 2008. All rights reserved. 679 Context-Aware Access Control for Pervasive Access to

More information

CHAPTER 10: WEB SERVICES

CHAPTER 10: WEB SERVICES Chapter 10: Web Services CHAPTER 10: WEB SERVICES Objectives Introduction The objectives are: Provide an overview on how Microsoft Dynamics NAV supports Web services. Discuss historical integration options,

More information

ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.

ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control. ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource

More information

Integration Guide. SafeNet Authentication Service. Oracle Secure Desktop Using SAS RADIUS OTP Authentication

Integration Guide. SafeNet Authentication Service. Oracle Secure Desktop Using SAS RADIUS OTP Authentication SafeNet Authentication Service Integration Guide Oracle Secure Desktop Using SAS RADIUS OTP Authentication Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013

More information

A Secure Authenticate Framework for Cloud Computing Environment

A Secure Authenticate Framework for Cloud Computing Environment A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure

More information

Glossary of Key Terms

Glossary of Key Terms and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which

More information

Digital libraries of the future and the role of libraries

Digital libraries of the future and the role of libraries Digital libraries of the future and the role of libraries Donatella Castelli ISTI-CNR, Pisa, Italy Abstract Purpose: To introduce the digital libraries of the future, their enabling technologies and their

More information

irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire akodgire@indiana.edu 25th

irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire akodgire@indiana.edu 25th irods and Metadata survey Version 0.1 Date 25th March Purpose Survey of Status Complete Author Abhijeet Kodgire akodgire@indiana.edu Table of Contents 1 Abstract... 3 2 Categories and Subject Descriptors...

More information

MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper

MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper Migrating Desktop and Roaming Access Whitepaper Poznan Supercomputing and Networking Center Noskowskiego 12/14 61-704 Poznan, POLAND 2004, April white-paper-md-ras.doc 1/11 1 Product overview In this whitepaper

More information

Using the VOM portal to manage policy within Globus Toolkit, Community Authorisation Service & ICENI resources

Using the VOM portal to manage policy within Globus Toolkit, Community Authorisation Service & ICENI resources Using the VOM portal to manage policy within Globus Toolkit, Community Authorisation Service & ICENI resources Asif Saleem Marko Krznarić Jeremy Cohen Steven Newhouse John Darlington London e-science Centre,

More information

An Efficient Use of Virtualization in Grid/Cloud Environments. Supervised by: Elisa Heymann Miquel A. Senar

An Efficient Use of Virtualization in Grid/Cloud Environments. Supervised by: Elisa Heymann Miquel A. Senar An Efficient Use of Virtualization in Grid/Cloud Environments. Arindam Choudhury Supervised by: Elisa Heymann Miquel A. Senar Index Introduction Motivation Objective State of Art Proposed Solution Experimentations

More information

End-to-end Processing with TIBCO Managed File Transfer (MFT) Improving Performance and Security during Internet File Transfer

End-to-end Processing with TIBCO Managed File Transfer (MFT) Improving Performance and Security during Internet File Transfer End-to-end Processing with TIBCO Managed File Transfer (MFT) Improving Performance and Security during Internet File Transfer 2 Abstract: File-transfer technology has become increasingly critical to the

More information

Enterprise SSO Manager (E-SSO-M)

Enterprise SSO Manager (E-SSO-M) Enterprise SSO Manager (E-SSO-M) Many resources, such as internet applications, internal network applications and Operating Systems, require the end user to log in several times before they are empowered

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

SCC717 Recent Developments in Information Technology

SCC717 Recent Developments in Information Technology SCC717 Recent Developments in Information Technology Lecturer: Wanlei ZHOU, Ph.D., DSc., Professor, Acting Head School of Information Technology Deakin University, Melbourne Campus Office: T205.2, Ext.

More information

CLOUD COMPUTING IN HIGHER EDUCATION

CLOUD COMPUTING IN HIGHER EDUCATION Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,

More information

Bond System Monitor. Purdue e-pubs. Purdue University. Kyung-Koo Jun. Ladislau Bölöni. Ruibing Hao. Dan C. Marinescu. Report Number: 98-026

Bond System Monitor. Purdue e-pubs. Purdue University. Kyung-Koo Jun. Ladislau Bölöni. Ruibing Hao. Dan C. Marinescu. Report Number: 98-026 Purdue University Purdue e-pubs Computer Science Technical Reports Department of Computer Science 1998 Bond System Monitor Kyung-Koo Jun Ladislau Bölöni Ruibing Hao Dan C. Marinescu Report Number: 98-026

More information

A Market-Oriented Grid Directory Service for Publication and Discovery of Grid Service Providers and their Services

A Market-Oriented Grid Directory Service for Publication and Discovery of Grid Service Providers and their Services The Journal of Supercomputing, 36, 17 31, 2006 C 2006 Springer Science + Business Media, Inc. Manufactured in The Netherlands. A Market-Oriented Grid Directory Service for Publication and Discovery of

More information

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Course 8036: Two days; Instructor-led Microsoft Certified Professional Exams No Microsoft Certified Professional

More information

ANALYSIS OF GRID COMPUTING AS IT APPLIES TO HIGH VOLUME DOCUMENT PROCESSING AND OCR

ANALYSIS OF GRID COMPUTING AS IT APPLIES TO HIGH VOLUME DOCUMENT PROCESSING AND OCR ANALYSIS OF GRID COMPUTING AS IT APPLIES TO HIGH VOLUME DOCUMENT PROCESSING AND OCR By: Dmitri Ilkaev, Stephen Pearson Abstract: In this paper we analyze the concept of grid programming as it applies to

More information

Data Grid Landscape And Searching

Data Grid Landscape And Searching Or What is SRB Matrix? Data Grid Automation Arun Jagatheesan et al., University of California, San Diego VLDB Workshop on Data Management in Grids Trondheim, Norway, 2-3 September 2005 SDSC Storage Resource

More information

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service

More information

P ERFORMANCE M ONITORING AND A NALYSIS S ERVICES - S TABLE S OFTWARE

P ERFORMANCE M ONITORING AND A NALYSIS S ERVICES - S TABLE S OFTWARE P ERFORMANCE M ONITORING AND A NALYSIS S ERVICES - S TABLE S OFTWARE WP3 Document Filename: Work package: Partner(s): Lead Partner: v1.0-.doc WP3 UIBK, CYFRONET, FIRST UIBK Document classification: PUBLIC

More information

Single Sign On In A CORBA-Based

Single Sign On In A CORBA-Based Single Sign On In A CORBA-Based Based Distributed System Igor Balabine IONA Security Architect Outline A standards-based framework approach to the Enterprise application security Security framework example:

More information

Lync SHIELD Product Suite

Lync SHIELD Product Suite Lync SHIELD Product Suite The Natural Solution For Securing Lync Connectivity For today s mobile enterprise, the need to connect smartphones to the corporate network has become a vital business requirement.

More information

Globus Toolkit: Authentication and Credential Translation

Globus Toolkit: Authentication and Credential Translation Globus Toolkit: Authentication and Credential Translation JET Workshop, April 14, 2004 Frank Siebenlist franks@mcs.anl.gov http://www.globus.org/ Copyright (c) 2002 University of Chicago and The University

More information

Federated Identity Architectures

Federated Identity Architectures Federated Identity Architectures Uciel Fragoso-Rodriguez Instituto Tecnológico Autónomo de México, México {uciel@itam.mx} Maryline Laurent-Maknavicius CNRS Samovar UMR 5157, GET Institut National des Télécommunications,

More information

Praseeda Manoj Department of Computer Science Muscat College, Sultanate of Oman

Praseeda Manoj Department of Computer Science Muscat College, Sultanate of Oman International Journal of Electronics and Computer Science Engineering 290 Available Online at www.ijecse.org ISSN- 2277-1956 Analysis of Grid Based Distributed Data Mining System for Service Oriented Frameworks

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................

More information

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, monalinarse9990@gmail.com 2 Assistant

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Distributed Systems Architectures

Distributed Systems Architectures Software Engineering Distributed Systems Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the advantages and disadvantages of different distributed systems

More information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential

More information

Web Service Based Data Management for Grid Applications

Web Service Based Data Management for Grid Applications Web Service Based Data Management for Grid Applications T. Boehm Zuse-Institute Berlin (ZIB), Berlin, Germany Abstract Web Services play an important role in providing an interface between end user applications

More information

GFI Product Guide. GFI MailArchiver Archive Assistant

GFI Product Guide. GFI MailArchiver Archive Assistant GFI Product Guide GFI MailArchiver Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

List of Projects in Application

List of Projects in Application List of Projects in Application S-Logix #9, First Floor, Krishnabai St, Habibullah Road T.Nagar, Chennai-600017 (Opp:HDFC Bank) Ph:28343467 Mobile: 8124001111, 9710999001 E-Mail: slogix.india@gmail.com

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

Using RD Gateway with Azure Multifactor Authentication

Using RD Gateway with Azure Multifactor Authentication Using RD Gateway with Azure Multifactor Authentication We have a client that uses RD Gateway to allow users to access their RDS deployment from outside their corporate network. They have about 1000+ users.

More information

Single-Sign-On in XtreemOS

Single-Sign-On in XtreemOS Single-Sign-On in XtreemOS Yvon Jégou INRIA 1 Single-Sign-On & Delegation Single-sign-on: avoid asking a user to authenticate each time he invokes a (new) service Security issues User comfort Scripts Delegation:

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Accessing Data with ADOBE FLEX 4.6

Accessing Data with ADOBE FLEX 4.6 Accessing Data with ADOBE FLEX 4.6 Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Chapter 1: Accessing data services overview Data

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft 5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft

More information

CLOUD COMPUTING. Keywords: Cloud Computing, Data Centers, Utility Computing, Virtualization, IAAS, PAAS, SAAS.

CLOUD COMPUTING. Keywords: Cloud Computing, Data Centers, Utility Computing, Virtualization, IAAS, PAAS, SAAS. CLOUD COMPUTING Mr. Dhananjay Kakade CSIT, CHINCHWAD, Mr Giridhar Gundre CSIT College Chinchwad Abstract: Cloud computing is a technology that uses the internet and central remote servers to maintain data

More information

FTA Computer Security Workshop. Secure Email

FTA Computer Security Workshop. Secure Email FTA Computer Security Workshop Secure Email March 8, 2007 Stan Wiechert, KDOR IS Security Officer Outline of Presentation The Risks associated with Email Business Constraints Secure Email Features Some

More information

Remote Access Password Tips

Remote Access Password Tips Introduction: The following document was created to assist Remote Access users with password change and synchronization issues. IT&S has identified the following five (5) scenarios for remote access password

More information

Citrix XenApp 6.5 Administration

Citrix XenApp 6.5 Administration Citrix XenApp 6.5 Administration CTX-XA65 DESCRIZIONE: Citrix XenApp 6.5 Basic Administration provides the foundation necessary for administrators to effectively centralize and manage applications in the

More information

Accessing the Microsoft Volume Licensing Center

Accessing the Microsoft Volume Licensing Center Volume Licensing User Guide Accessing the Microsoft Volume Licensing Center May 2015 1 Table of Contents Using This Guide... 4 Audience... 4 Purpose... 4 Introduction... 4 Step 1: Identify the Domain Administrator

More information

GFI Product Manual. GFI MailArchiver Outlook Addon

GFI Product Manual. GFI MailArchiver Outlook Addon GFI Product Manual GFI MailArchiver Outlook Addon The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express

More information

A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System

A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System Sashi Tarun Assistant Professor, Arni School of Computer Science and Application ARNI University, Kathgarh,

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information