Intrinsic Security in the SORCER Grid

Slides:



Advertisements
Similar presentations
RBAC and HIPAA Security Uday O. Ali Pabrai, CHSS, SCNA Chief Executive, HIPAA Academy.
Advertisements

DNSSEC in Windows Server. DNS Server changes Provide DNSSEC support in the DNS server – Changes should allow federal agencies to comply with SC-20 and.
The Next Generation Grid Kostas Tserpes, NTUA Beijing, 22 of June 2005.
GT 4 Security Goals & Plans Sam Meder
Medicaid Management Information System (MMIS) Replacement
EPiServer Connect for Microsoft SharePoint. En översikt: EPiServer Connect for SharePoint.
Joint Information Systems Committee 25/08/2014 | slide 1 JISC Core Middleware Programme Meeting Middleware in Development Joint Information Systems CommitteeSupporting.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
PDC Enabling Science Grid Security Research Olle Mulmo.
CLAG 2004 – April/041 A Workflow-based Architecture for e- Learning in the Grid Luiz A. Pereira, Fábio A. Porto, Bruno Schulze, Rubens N. Melo
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
The SMS project WP 4.3: The Simple Service Authoring Wizard ICCS.
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents Presented By Mr. Muhammad Awais Shibli.
HIPAA COMPLIANCE WITH DELL
Middleware challenges to service providers, the Nordic view TERENA, Ingrid Melve, UNINETT.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Sudha Iyer Principal Product Manager Oracle Corporation.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
L. A. S. E. R Local Authority Security Enterprise Reporting System Architecture.
Cole David Ronnie Julio. Introduction Globus is A community of users and developers who collaborate on the use and development of open source software,
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
MagicNET: XACML Authorization Policies for Mobile Agents Mr. Awais Shibli.
Mobile Analyzer A Distributed Computing Platform Juho Karppinen Helsinki Institute of Physics Technology Program May 23th, 2002 Mobile.
8a Certified. About Us  Headquarters in Vienna, VA  Service Disabled Veteran-owned Small Business  SBA 8(a) program participant  Small Disadvantaged.
ACGT Architecture and Grid Infrastructure Juliusz Pukacki ‏ EGEE Conference Budapest, 4 October 2007.
Cyber Security Issues in HEP and NP Grids Bob Cowles — SLAC NC August 2004.
8a Certified. About Us  Headquarters in Vienna, VA  Service Disabled Veteran-owned Small Business  SBA 8(a) program participant  Small Disadvantaged.
Cancer Bioinformatics Grid (caBIG) CANS 2006 Chicago, Illinois
Identity and Access Management
TCSEC: The Orange Book.
Information Security, Theory and Practice.
Update from the Faster Payments Task Force
Conflict Resolution & Policy Compliance in Multi-Cloud Distributed System. Presented By:- Adarsh Pillay Deepak Begrajka Rudra gupta.
Microsoft Azure Cloud Helps Clients Accelerate and Streamline Proposal Management Process “The flexibility, scalability and security of Azure made it the.
UCLA ESB Platform ais. ucla
Federated IdM Across Heterogeneous Clouding Environment
EMI Interoperability Activities
TGaq Service Transaction Protocol for ANDSF Discovery Service
Similarities between Grid-enabled Medical and Engineering Applications
Risk Management and Compliance
Computing Resource Allocation and Scheduling in A Data Center
CompTIA Security+ Study Guide (SY0-401)
The Scope for Continuous Assurance In Tax Compliance
Grid Computing B.Ramamurthy 9/22/2018 B.Ramamurthy.
VSA Integration with Apache
SECURITY MECHANISM & E-COMMERCE
The New Virtual Organization Membership Service (VOMS)
A mobile single sign-on system
THE ORANGE BOOK Ravi Sandhu
IE Job Description (Consulting, Government, Military)
IS4680 Security Auditing for Compliance
The E-Authentication Initiative
AAA: A Survey and a Policy- Based Architecture and Framework
OpenID Enhanced Authentication Profile (EAP) Working Group
IBM Software New life for legacy card processing system IBM CICS Transaction Server improves time-to-market for new solutions and services The need: A.
IT Management Services Infrastructure Services
OpenID Enhanced Authentication Profile (EAP) Working Group
Presentation transcript:

Intrinsic Security in the SORCER Grid Abhijit Rai Objective/Approach Task Description A grid is a vast repository of virtual services. Grids are being built with systems that build up, rather than replace, legacy components. And that makes securing virtual services more difficult. Objective: Develop robust, scaleable and multi-layered security solutions for federated services including a generic secure wrapper for legacy code. Approach: Deploying the following security requirements into the SORCER environment: Requestor/Provider identification and authentication Proxy verification Authorization Resource control and containment Privacy and Integrity Non-repudiation Accountability Schedule Benefits Controls access to the federated services in the SORCR grid. Provides multi-layered authorization with the help of policy objects, guarded objects, and JAAS. Builds trust between client and the service by proxy verification. Audits (Reporter provider) execution of federated providers. 1. Background Research 09/01 2. Authentication and Identification 09/15 3. Proposal Presentation 09/30 4. Facilitate Authorization 10/15 5. Implement Proxy Verification 10/30 6. Enable Auditing Capabilities 11/15 8. Thesis Defense and Demo 12/10