Download presentation
Presentation is loading. Please wait.
Published byJesse Dillon Modified over 10 years ago
1
SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY Osaka University,Japan Yang Shuo Kazunori Nozaki Shinji Shimojo
2
Penetrator visualization service Users can apply some annotations here. BUT, They want to share those annotations depending on their roles. Users can apply some annotations here. BUT, They want to share those annotations depending on their roles.
3
Necessity of a security source management The conventional technologies of those access controls are insufficient for e-Science environments because of the scale and diversity. Uid: s-date VO: B Uid: you VO: A Annotation Tiled Display Wall VO: A VO: B Control
4
PERMIS Penetrator Integrated middleware system 4 LDAP server repository XSLT offered service Access control service Policy Decision Point XSLTstyle sheet Reture XSLT Style Sheet Proxy certificate XSLT pattern N XSLT (pattern N) return Viz.xml final result Policy Enforcement Point Meta data service search result Penetrator Servlet search Viz.xml ID 1 Viz.xml ID 2 XML repository Viz.xml Attribute certificate PERMIS XSLT acquisition service Filtering Function Proxy certificate XSLT pattern N GT4 GAMA server middleware that achieve access control function easily Filtered Viz.xml file User ID search attribute certificate Tomcat Gridsphere GAMA
5
Experiment of a visualization system using Integrated authorization and authentication middleware Visualization and access control system by cooperating with GAMA, PERMIS, and Penetrator seamlessly Hospital Visible result research node researcher Doctor Medial researcher Medial Medical Institute Computer center E-science Platform Attribute certificate Access control using PERMIS Simulation service Visualization service Visualization service simulation result Transfer service Media data Transfer Volume data retrieval service by Penetrator SRB service PERMIS PEP Research node access service PERMIS PEP Authentication method by GAMA MyProxy id/passwd
6
Penetrator Demostration using TDW
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.