CSE300-2 Distributed Object Computing

Slides:



Advertisements
Similar presentations
IFIP Profs. Steven A. Demurjian and T.C. Ting J. Balthazar, H. Ren, and C. Phillips Computer Science & Engineering Department 191 Auditorium Road,
Advertisements

A Mobile Agent Architecture for Heterogeneous Devices Presented by: Chuong Hoang CS Software Architect and Design The University of Texas at Dallas.
CSE300-1 Profs. Steven A. Demurjian Q. Jin, J. Nam, Z. Qian and C. Phillips Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The.
JINI Shashwat Shriparv InfinitySoft.
THE JINI TECHNOLOGY Alessio Zumbo
The road to reliable, autonomous distributed systems
Interactive Systems Technical Design Seminar work: Web Services Janne Ojanaho.
CIM2564 Introduction to Development Frameworks 1 Overview of a Development Framework Topic 1.
Technical Architectures
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 2 Software Processes.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
J2EE Java 2 Enterprise Edition. Relevant Topics in The Java Tutorial Topic Web Page JDBC orial/jdbc
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Presented by Mark Miyashita
Mantychore Oct 2010 WP 7 Andrew Mackarel. Agenda 1. Scope of the WP 2. Mm distribution 3. The WP plan 4. Objectives 5. Deliverables 6. Deadlines 7. Partners.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
CS 360 Lecture 3.  The software process is a structured set of activities required to develop a software system.  Fundamental Assumption:  Good software.
Software Engineering Management Lecture 1 The Software Process.
Introduction To System Analysis and Design
Jini tm NetworkingTechnology Directions Jim Waldo Jini Architect Sun Microsystems, Inc.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Integrated Systems Division Service-Oriented Programming Guy Bieber, Lead Architect Motorola ISD C4I 2000 OOPSLA Jini Pattern Language Workshop Guy Bieber,
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Jini Architecture Introduction System Overview An Example.
Jini Architectural Overview Li Ping
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Goals of Protection Operating.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
Software Development Process CS 360 Lecture 3. Software Process The software process is a structured set of activities required to develop a software.
Software Reuse. Objectives l To explain the benefits of software reuse and some reuse problems l To discuss several different ways to implement software.
Software Project Configuration Management
Software Engineering Management
Operating Systems Protection Alok Kumar Jagadev.
User Interface Design and Usability Course Introduction
Walter Binder Giovanna Di Marzo Serugendo Jarle Hulaas
Role-Based Security in a Distributed Resource Environment*
OO Methodology OO Architecture.
Distribution and components
Business System Development
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 10 Development of Multimedia Project
Service-centric Software Engineering
Chapter 14: Protection.
CE Operating Systems Lecture 21
Chapter 14: Protection.
Introduction To software engineering
Chapter 14: Protection.
UML profiles.
Software Design Lecture : 15.
An Introduction of Jini Technology
An Introduction to Software Architecture
A Component-based Architecture for Mobile Information Access
Distributed Systems through Web Services
Chapter 14: Protection.
Could Jiro™ Extend the Jini™ Pattern Lanuguage?
Chapter 14: Protection.
Design Yaodong Bi.
Chapter 14: Protection.
Dynamic Exchange of Capabilities Between Mobile Agents
AICT5 – eProject Project Planning for ICT
SOFTWARE DEVELOPMENT LIFE CYCLE
Preventing Privilege Escalation
Presentation transcript:

CSE300-2 Distributed Object Computing

Semester Project Specification

Topic: Security for Distributed Resource Environments

Group Members:

Charles E. Phillips, Jr. (Chip)

Qi Jin (Qi)

Jae-guon Nam (Jae)

Zhenlin Qian (Jason)

Topic Overview.

Distributed resource environments have lagged in support of security, providing minimal functionality to control the availability of a resource’s services to clients. To address this deficiency, we have developed a model and two prototypes for integrating a role-based security model, authorization, authentication, and enforcement into a distributed resource environment. The prototypes have been implemented using Sun’s JINI technology, which promotes the construction and deployment of distributed applications. Currently, the prototypes run separately, one as a University Database System with simplified role-based security included and second as a stand alone, reusable, Security Client designed to be used as a general security resource. The goal for this semester, it to improve on the previous prototypes by modifying code and implementing new security features based on our research. The overall goal, of course, is to provide an improved security model and prototype which will support role-based security in a distributed resource environment. These are our objectives:

.Prototype our security model by merging the University Database functionality with the reusable Security Client to provide a fully functional role-based security to the University Database System as a proof of concept.

.Implement the use of different database management systems within the environment.

.Implement the prototype security environment using different computer platforms and operating systems.

.Establish support of dual security clients running in the same distributed environment.

.Explore Jini Leasing capabilities, revise the security client model, and implement a leasing enforcement mechanism that will enhance the security environment.

.Use the Unified Modeling Language (UML) to examine our prototype and make improvements.

.Examine related areas and develop a revised security model.

A Software Architecture for Role-Base Security In a distributed resource environment, different resources (hardware or software) are treated in a fashion that allows all clients and resources to be seamlessly integrated. Clients can consult a Lookup Service to locate and execute “services” on “found” resources to carry out their tasks. However, these environments lack security support. When a resource registers its services with the Lookup Service, there is currently no way for the resource to dictate which service can be utilized by which client. The current solution for a resource to control access to its services is by changing the program. This, of course is not an optimum solution. We are interested in extending the security capabilities of a distributed resource environment to allow resources to selectively and dynamically control who can access its services (and invoke their methods), based on the role of the client. We will use the capabilities of the distributed resource environment, to define dedicated resources which will, authorize, authenticate, and enforce role-based security for the distributed application. A Proposed Software Architecture Security Client and Resource Interactions Figure 3.3 contains a depiction of a Security Client and a General Resource (e.g., legacy, COTS, database, etc.). We will implement the University Database as a general resource. The Security Client contains the services from the three security resources that can be used to establish and enforce the security policy. These clients create/find clients; authorize roles to clients; and grant, revoke, and find the privileges that a role has against a resource, service, and/or method. The General Resource is the required to register itself, its services, and their methods with the Role-Based Privileges Resource. Client Interactions and Processing To illustrate the process for a GUI Client accessing a Database Resource using the Lookup Service, and the Security Registration, Authorization List, and Role-Based Privileges resources, we present the example in Figure 3.4, with flow via the numbered service invocations and returned results.

Experimental Prototypes

The latest prototypes are implemented on Windows NT 4. 0, using Java 1 The latest prototypes are implemented on Windows NT 4.0, using Java 1.2.2 and JINI 1.0. We have implemented two prototypes to date, described in the next two sections. The first prototype employs a university application in which we implemented a subset of our security architecture. Students can query course information and enroll in classes, and faculty can query and modify the class schedule. The second prototype is the Security Client. Baseline Prototype The Security Client Prototype

Qi will take on the following objectives: Implement the use of different database management systems within the environment; Implement the prototype security environment using different computer platforms and operating systems; and Establish support of dual security clients running in the same distributed environment.

Jae will take on the following objectives: Merge the existing prototypes and use the Unified Modeling Language (UML) to examine our prototype and make improvements.

Related Work: Mobile Agent Security in a Distributed Resource Environment

And Jason will explore Jini’s Leasing capabilities, help revise the security client model, and implement a leasing enforcement mechanism that will enhance the security environment.

Related Work: Security Models for Distributed Resource Environments

Planned Activities

.Weekly meetings on Tuesday to discuss progress and address coordination issues.

.Bi-weekly summary of activities to ease demand for midterm report and final project.

.Midterm Report. 25 October.

.Project Completed 7 December.

Final Briefing 9 December.

Flow of Work

Chip will be at a two week Network Security Course in Italy and will hopefully return with some new insights. The group, as a whole, has been given access to the existing source code for near term review and familiarization. Individually, group members will need a couple of weeks to familiarize themselves with their work objectives and find references that can support both their objective work and related work topics. Our group meetings will commence on Tuesday 3 October.