1 / 6

SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY

Osaka University,Japan Yang Shuo Kazunori Nozaki Shinji Shimojo. SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY. Penetrator visualization service. Users can apply some annotations here. BUT, They want to share those annotations depending on their roles. Uid: you VO: A.

edolie
Download Presentation

SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Osaka University,Japan Yang Shuo KazunoriNozaki Shinji Shimojo SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY

  2. Penetrator visualization service Users can apply some annotations here. BUT, They want to share those annotations depending on their roles.

  3. Uid: you VO: A Uid: s-date VO: B Necessity of a security source management Control Annotation Control Annotation VO: A VO: B Tiled Display Wall The conventionaltechnologies of those access controlsare insufficient for e-Science environments because of the scale and diversity.

  4. PERMIS、Penetrator Integrated middleware system Policy Enforcement Point Meta data service middleware that achieve access control function easily Viz.xml (ID 1) Penetrator Servlet Viz.xml (ID 2) ②search ①search Access control service ③result GAMA XML repository ⑫ Viz.xml final result Viz.xml Gridsphere Tomcat ⑪ Filtered Viz.xml file Filtering Function ④Viz.xml ⑩XSLT (pattern N) return ④User ID GAMAserver XSLT acquisition service ⑤Proxy certificate ⑨XSLT( pattern N) ⑥Proxy certificate Policy Decision Point LDAP server repository XSLT offered service GT4 ⑧Reture XSLT Style Sheet XSLTstyle sheet Attribute certificate XSLT(pattern N) ⑦search attribute certificate PERMIS

  5. Visualization service Visualization service Simulation service Research node access service Media data Transfer simulation result Transfer service E-science Platform research node SRB service PERMIS PEP PERMIS PEP PERMIS PEP PERMIS PEP PERMIS PEP PERMIS PEP Experiment of a visualization system using Integrated authorization and authentication middleware • Visualization and access control systemby cooperating with GAMA, PERMIS, and Penetrator seamlessly Computer center Medical Institute B Hospital A Doctor id/passwd researcher Medial researcher Access control using PERMIS Volume data retrieval service by Penetrator Authentication method by GAMA Attribute certificate MyProxy Medial DB Visible result

  6. Penetrator Demostration using TDW

More Related