seamless and safe resource management technology n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY PowerPoint Presentation
Download Presentation
SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY

Loading in 2 Seconds...

play fullscreen
1 / 6

SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY - PowerPoint PPT Presentation


  • 76 Views
  • Uploaded on

Osaka University,Japan Yang Shuo Kazunori Nozaki Shinji Shimojo. SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY. Penetrator visualization service. Users can apply some annotations here. BUT, They want to share those annotations depending on their roles. Uid: you VO: A.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY' - edolie


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
penetrator visualization service
Penetrator visualization service

Users can apply some annotations here.

BUT,

They want to share those annotations depending on their roles.

necessity of a security source management

Uid: you

VO: A

Uid: s-date

VO: B

Necessity of a security source management

Control

Annotation

Control

Annotation

VO: A

VO: B

Tiled Display Wall

The conventionaltechnologies of those access controlsare insufficient for e-Science environments because of the scale and diversity.

permis penetrator integrated middleware system
PERMIS、Penetrator Integrated middleware system

Policy Enforcement Point

Meta data service

middleware that achieve access

control function easily

Viz.xml

(ID 1)

Penetrator

Servlet

Viz.xml

(ID 2)

②search

①search

Access control

service

③result

GAMA

XML repository

⑫ Viz.xml

final result

Viz.xml

Gridsphere

Tomcat

⑪ Filtered Viz.xml file

Filtering Function

④Viz.xml

⑩XSLT (pattern N) return

④User ID

GAMAserver

XSLT acquisition service

⑤Proxy certificate

⑨XSLT( pattern N)

⑥Proxy certificate

Policy Decision Point

LDAP server repository

XSLT offered service

GT4

⑧Reture XSLT Style Sheet

XSLTstyle sheet

Attribute certificate

XSLT(pattern N)

⑦search attribute certificate

PERMIS

experiment of a visualization system using integrated authorization and a uthentication middleware

Visualization

service

Visualization

service

Simulation

service

Research node

access service

Media data

Transfer

simulation result

Transfer service

E-science Platform

research node

SRB service

PERMIS PEP

PERMIS PEP

PERMIS PEP

PERMIS PEP

PERMIS PEP

PERMIS PEP

Experiment of a visualization system using Integrated authorization and authentication middleware
  • Visualization and access control systemby cooperating with GAMA, PERMIS, and Penetrator seamlessly

Computer center

Medical

Institute B

Hospital A

Doctor

id/passwd

researcher

Medial

researcher

Access control

using PERMIS

Volume data retrieval

service by Penetrator

Authentication

method by GAMA

Attribute

certificate

MyProxy

Medial DB

Visible result