Distributed Computing Systems Ryan Harrod. Definition  Server delegates computations to clients  Usually over a network.

Slides:



Advertisements
Similar presentations
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner, Clifford Neuman, and Jeffrey I. Schiller Massachusetts Institute of Technology.
Advertisements

©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 9 Distributed Systems Architectures Slide 1 1 Chapter 9 Distributed Systems Architectures.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SWE 316: Software Design and Architecture
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Data Security in a Distributed Services Medical Imaging Network Zhihong Yang University of Connecticut.
Distributed Systems Architectures
Database Administration ISQA 436 Fall 2006 Mark Freeman
Database Connectivity Rose-Hulman Institute of Technology Curt Clifton.
KerberSim CMPT 495 Fall 2004 Jerry Frederick. Project Goals Become familiar with Kerberos flow Create a simple Kerberos simulation.
Chapter 5 Database Application Security Models
1 System support & Management Protocols Lesson 13 NETS2150/2850 School of Information Technologies.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
The Client/Server Database Environment
OWASP Mobile Top 10 Why They Matter and What We Can Do
Database Application Security Models
Introduction to SQL 2005 Security Nick Ward SQL Server Specialist Nick Ward SQL Server Specialist
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Database System Concepts and Architecture Lecture # 3 22 June 2012 National University of Computer and Emerging Sciences.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Week 7 Lecture Web Database Development Samuel Conn, Asst. Professor
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
1 Course Introduction CS423 Client/Server Programming and Apps References: Comer/Stevens, Ch1.
Highly Distributed Parallel Computing Neil Skrypuch COSC 3P93 3/21/2007.
Feasibility Study.
Security Testing Case Study 360logica Software Testing Services.
Attacking Applications: SQL Injection & Buffer Overflows.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
How computer’s are linked together.
Client-Server Processing, Parallel Database Processing and Distributed Database Systems. KEVIN ROBERTS ANIKET MURLIDHARAN.
Middleware at HVA Assignment 4.5 Brian Samson & Peter Troon.
MIS 327 Database Management system 1 MIS 327: DBMS Dr. Monther Tarawneh Dr. Monther Tarawneh Week 2: Basic Concepts.
A Distributive Server Alberto Pareja-Lecaros. Introduction Uses of distributive computing - High powered applications - Ever-expanding server so there’s.
Lecture 5: User Accounts & Directory Service Instructor: Dr. Najla Al-Nabhan
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
CSC 480 Software Engineering Lecture 18 Nov 6, 2002.
1 Principles of Database Systems With Internet and Java Applications Today’s Topic Chapter 15: Reliability and Security in Database Servers Instructor’s.
March 24, 2004Craig E. Ward, CMSI 698 Advanced Topics in Database Systems Database Architecture Overview Client-Server and Distributed Architectures.
+ Security Concerns Chapter Security types Physical security Access security Database security.
CSC480 Software Engineering Lecture 10 September 25, 2002.
Lecture 13 Page 1 CS 236 Online Principles for Secure Software Following these doesn’t guarantee security But they touch on the most commonly seen security.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Chapter 15: Reliability and Security in Database Servers Neyha Amar CS 157B May 6, 2008.
Database Management Systems
Distributed Pattern Recognition System, Web-based by Nadeem Ahmed.
Chapter 9  Definition of terms  List advantages of client/server architecture  Explain three application components:
 Distributed Database Concepts  Parallel Vs Distributed Technology  Advantages  Additional Functions  Distribution Database Design  Data Fragmentation.
CSC 480 Software Engineering Lecture 17 Nov 4, 2002.
April 20022/CS/3XWHN 1 Database Design Where next? John Wordsworth Department of Computer Science The University of Reading Room.
David P. Anderson Space Sciences Laboratory University of California – Berkeley Public Distributed Computing with BOINC.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Secured Services Best Practices on ArcGIS for Server Patrick Jackson & Thomas Noble.
DNS Security Advanced Network Security Peter Reiher August, 2014
The Client/Server Database Environment
Grid Computing.
The Client/Server Database Environment
CSC 480 Software Engineering
Distributed Computing with SAGE Yi Qiang
EPICS meeting at SLAC April 26, 2005 N. Yamamoto
Application Security Namuo – CIS 160
Database.
السلوك التنظيمى المعاصر
Mobile Agents M. L. Liu.
NET 536 Network Security Lecture 8: DNS Security
An Introduction to Cloud Computing
NET 536 Network Security Lecture 6: DNS Security
Week1 software - Lecture outline & Assignments
Module 1: Overview of Systems Management Server 2003
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Presentation transcript:

Distributed Computing Systems Ryan Harrod

Definition  Server delegates computations to clients  Usually over a network

Examples    Genetic Algorithms  Scheduling Algorithms[5] Source: Stanford University.

Primary Security Problems  Local system[1]  Remote client systems[3]  Reading/Writing data to client systems[1]

Local System  Similar security procedures as discussed in class  Authenticate users  SQL Injections  Etc  Validate data to/from databases

Methods of securing  Pretty much everything discussed in class

Remote Client Systems  Completely untrustworthy[2]  Spoofable[2]  Corruptible[2]  Developers have no control over clients[1]

Methods of securing  Assume the client is corrupt[3]  Reduce functionality[3]  No privilege hierarchy[3]  Limit privileges(overall)[3]  Especially if using someone else’s libraries

Data integrity  Primarily between server/client  Is the server giving legitimate problems?[1]  Is the client giving legitimate answers?[1]

Methods of Securing  Input validation!  Encryption

Main Security Concerns  Local environment  Client systems  Data integrity

References 1. O'Reilly & Associates. Java Distributed Computing April Shafi Goldwasser, Ronald Rivest. Security for Distributed Computer Systems April Wm A. Wulf, Chenxi Wang, Darrell Kienzle. A New Model of Security for Distributed Systems April Any and all lectures from Jim Ward 5. R.Nedunchelian, K.Koushik, N.Meiyappan, V.Raghu. Dynamic Task Scheduling Using Parallel Genetic Algorithms For Heterogenous Distributed Computing April 2011.

Q A [4] &