Browsing by Subject "Jini"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
Item A federated grid environment with replication services(2005-12) Khurana, Vivek; Sobolewski, Michael; López-Benitez, NoéIn general, grids are classified as computational grids, data grids and access grids. Computational grids address applications that deal with complex and time intensive computational problems usually on relatively small data-sets; whereas data grids address the needs of data intensive applications that deal with the evaluation and mining of large amounts of data in the terabyte and petabyte range. While SORCER is basically a computation grid environment, a complementing data grid service called Replica Provider is introduced. To have an increased functionality, the newly developed data grid service is used to leverage the already existing SORCER compute grid. SORCER Service Oriented Programs along with replication services will now have a capability of running data grid applications. Advances in sequencing technology have created a tremendous amount of data to be analyzed. Therefore, there is an increased need to have distributed BLAST (Basic Local Alignment Search Tool) capabilities that will support easy deployment and enable large batch BLAST processes over heterogeneous platforms. Data Grid will help in maintaining and updating such databases in a distributed computing environment easily and efficiently. It will optimize access to such databases and increase reliability by replicating these at multiple locations. A federated grid environment for BLAST (S-BLAST) developed in a federated distributed environment is presented. SBLAST enables processing of large sequence files distributed over diverse system architectures and computing resources. It also enables large number of files to be replicated on multiple nodes over different heterogeneous computation platforms simultaneously for providing generic service providers fast, up-to-date, reliable and secure access to file storage.Item Intrinsic security in SORCER (service oriented) grid(Texas Tech University, 2005-05) Rai, Abhijit; Sobolewski, Michael; Zhuang, Yu; Hernandez, Hector J.A grid is a vast repository of virtual services. SORCER is a computational grid environment based on the Service Oriented Paradigm. Security and trust, in SORCER, are of utmost importance since the grid resources and the requestors connecting to faceless service providers are at high risk. For example, if a virus code is sent for computation, the grid resources are at high risk. Similarly, if rogue services are present on the network, requestor’s privacy and security are at risk. A security framework for a grid shall ensure access control to the federated services by authenticated and authorized users so that the requestors and services are able to work with mutual–trust. Today, grids are being used to build the systems which build up, rather than replace, legacy components. This makes securing virtual services even more difficult. The task of securing the SORCER grid can be accomplished by incorporating the following security practices into the SORCER environment: - Requestor (Client/Service) Identification and Authentication - Proxy Verification (building trust) - Authorization - Resource Control and Containment - Privacy and Integrity - Non-Repudiation - Accountability (Auditing) The security mechanism needs to be intrinsic to the grid, so that secure services can be built without being concerned with security on a per service basis. This will greatly reduce the effort required in patching security of individual services. Our goal is to achieve Intrinsic Security by developing robust, scaleable, and multi-layered security solutions for federated services.Item Intrinsic security in SORCER (Service Oriented) grid(2006-09) Rai, Abhijit; Sobolewski, Michael; Zhuang, Yu; Hernandez, Hector J.A grid is a vast repository of virtual services. SORCER is a computational grid environment based on the Service Oriented Paradigm. Security and trust, in SORCER, are of utmost importance since the grid resources and the requestors connecting to faceless service providers are at high risk. For example, if a virus code is sent for computation, the grid resources are at high risk. Similarly, if rogue services are present on the network, requestor’s privacy and security are at risk. A security framework for a grid shall ensure access control to the federated services by authenticated and authorized users so that the requestors and services are able to work with mutual–trust. Today, grids are being used to build the systems which build up, rather than replace, legacy components. This makes securing virtual services even more difficult. The task of securing the SORCER grid can be accomplished by incorporating the following security practices into the SORCER environment: -Requestor (Client/Service) Identification and Authentication -Proxy Verification (building trust) -Authorization -Resource Control and Containment -Privacy and Integrity -Non-Repudiation -Accountability (Auditing) The security mechanism needs to be intrinsic to the grid, so that secure services can be built without being concerned with security on a per service basis. This will greatly reduce the effort required in patching security of individual services. Our goal is to achieve Intrinsic Security by developing robust, scaleable, and multi-layered security solutions for federated services.Item Smart card authentication and authorization framework(2005-05) Bhatla, Saurabh; Sobolewski, Michael; Zhuang, Yu; Hernandez, Hector J.Service-oriented approach to computing has gained the widespread attention of researchers and the industry. Major initiatives include service-oriented programming (SOP) for constructing software components and service-oriented architectures (SOA) for distributed applications. Software programs developed using SOP can be thought of as mega programs, where the component programs can exchange messages through clearly defined interfaces. SOP environment relies on the exchange of information between various services over various networks. Services may exchange sensitive information that should only be available for a limited number of persons. Therefore it is necessary that various principals (people, computers, servers) can authenticate themselves. Authentication means that a principal can prove his identity. This can be done by means of secrets, usually cryptographic keys. The process of deciding if user X is allowed to have access to service Y is called authorization. SOP environments may require authorization based on user interaction before he/she is allowed access to the services. Further, if sensible information is sent over an open network, an eavesdropper should not be able to understand the information that is sent and he should not be able to change this information without the receiver detecting this. Smart cards and the online authentication technology known as Public Key Infrastructure (PKI) seems the perfect solution to achieve this. They are designed to allow individuals anywhere in the world to identify each other, exchange data in encrypted form and to digitally sign documents in ways that cannot later be repudiated. My research is based on designing a Smart Card based framework for SORCER that will provide user authentication and authorization. This standard security mechanism will not only enforce more consistent security policies, but application developers will be freed from the low-level drudgery of building explicit security controls into their software.Item Smart card authentication and authorization framework(Texas Tech University, 2005-05) Bhatla, Saurabh; Sobolewski, Michael; Zhuang, Yu; Hernandez, Hector J.Service-oriented approach to computing has gained the widespread attention of researchers and the industry. Major initiatives include service-oriented programming (SOP) for constructing software components and service-oriented architectures (SOA) for distributed applications. Software programs developed using SOP can be thought of as mega programs, where the component programs can exchange messages through clearly defined interfaces. SOP environment relies on the exchange of information between various services over various networks. Services may exchange sensitive information that should only be available for a limited number of persons. Therefore it is necessary that various principals (people, computers, servers) can authenticate themselves. Authentication means that a principal can prove his identity. This can be done by means of secrets, usually cryptographic keys. The process of deciding if user X is allowed to have access to service Y is called authorization. SOP environments may require authorization based on user interaction before he/she is allowed access to the services. Further, if sensible information is sent over an open network, an eavesdropper should not be able to understand the information that is sent and he should not be able to change this information without the receiver detecting this. Smart cards and the online authentication technology known as Public Key Infrastructure (PKI) seems the perfect solution to achieve this. They are designed to allow individuals anywhere in the world to identify each other, exchange data in encrypted form and to digitally sign documents in ways that cannot later be repudiated. My research is based on designing a Smart Card based framework for SORCER that will provide user authentication and authorization. This standard security mechanism will not only enforce more consistent security policies, but application developers will be freed from the low-level drudgery of building explicit security controls into their software.