The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Grid portal is a secure web environment where user can monitor and execute grid applications, access grid resources, services, and collaborate with other users. A grid portal allows an organization to have a single URL that enables users to gain browser-based access to applications and any customized information in a virtualized, unified and secure way. The main requirement for this grid portal is...
This paper analyzes the status of the computer lab and traditional management of several problems, made use of its software and manage the development of secondary development of access control systems and remote video monitoring systems to automate the management of design. Realization of the system mainly uses the middleware technology, pattern recognition, data mining technology to solve the organic...
One major problem faced by end-users and administrators of computational grid environments arise in connection with the usability of the security mechanisms usually deployed in these environments, in particular identity management. Many of the existing computational grid environments use Public Key Infrastructure (PKI) and X.509 digital certificates as a corner stone for their security architectures...
First of all clarify the research background, and introduces the necessary theory and techniques involved in the relevant. Through the management information system access system resources study of various control methods, using RBAC access control technology to design and implement a middleware based rights management that can run on a variety of hardware and software platform to facilitate the conduct...
e-science and e-research is about supporting collaborations especially those that cross administrative boundaries. Typically this is achieved through establishing virtual organizations (VOs) where several institutions and individuals wish to contribute resources for their mutual interest, e.g. to address a given research topic. VOs can be fluid in nature and any individual/cooperating entity may in...
A spatial data access control model in grid environment was proposed base on Globus Security Infrastructure (GSI). Firstly, A spatial datasets sharing framework was built up by Monitor and Discover Service (MDS), and then a common control model was proposed to realize spatial data access control. In this model, every user was mapped to a given role, and every role had a unique digital certificate...
Security is one of the most important issues in grid computing. Therefore it is an inevitable function in most kinds of grid middleware to ensure the security of resource access. Efforts of this literature focus on file security in grid system. An architecture for file scan and monitoring is proposed on top of OGSA-based grid middleware as well as NFS, for the purpose of preventing the spread of virus...
The four High Energy Physics (HEP) detectors at the Large Hadron Collider (LHC) at the European Organization for Nuclear Research (CERN) are among the most important experiments where the National Institute of Nuclear Physics (INFN) is being actively involved. A Grid infrastructure of the World LHC Computing Grid (WLCG) has been developed by the HEP community leveraging on broader initiatives (e.g...
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms of injury. The multidisciplinary expertise needed for such reviews is not available at any one institution, resulting in the need for remote collaboration, while the sensitive nature of the information requires secure transmission...
This paper describes a portlet-based portal that provides user interfaces for access to a Grid-based e-learning platform. E-learning platforms that exploit resources and computing power of Grid infrastructure define the concept of "e-learning Grid". For the development of our e-learning Grid, we have used open source Globus Toolkit as core middleware and a Web e-learning application containing...
Traditional authorization mechanisms based on the request-response model are generally supported by point-to-point communication between applications and authorization servers. As distributed applications increase in size and complexity, an authorization architecture based on point-to-point communication becomes fragile and difficult to manage. This paper presents the use of the publish-subscribe...
Three-tiered information systems often use application-level authentication and authorization schemes. In these architectures, successful attacks to the application server layer offer the attacker unlimited access to the database. The proposed solution to this problem is based on a set of views employing session-scope data to determine the effective user rights. These views are generated from formal...
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware computing. This paper describes our experiences in building a middleware component, the context privacy engine (CPE), that enforces a role-based, context-dependent privacy model for enterprise domains. While fundamentally an ACL-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.