seamless, and safe resource management technology osaka university,japan yang shuo kazunori nozaki...
TRANSCRIPT
SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY
Osaka University,JapanYang Shuo
Kazunori Nozaki Shinji Shimojo
Penetrator visualization service
Users can apply some annotations here.
BUT,They want to share those annotations depending on their
roles.
Users can apply some annotations here.
BUT,They want to share those annotations depending on their
roles.
Necessity of a security source management• The conventional technologies of those access
controls are insufficient for e-Science environments because of the scale and diversity.
Uid: s-dateVO: B
Uid: youVO: A
Annotation
Annotation
Tiled Display Wall VO: A VO: B
Control
Control
PERMIS 、 Penetrator Integrated middleware system
4
LDAP server repositoryLDAP server repository
XSLT offered service
Access controlservice
Policy Decision Point
XSLTstyle sheet
XSLTstyle sheet
⑧Reture XSLT Style Sheet
⑤ Proxy certificate
XSLT ( pattern N )
XSLT ( pattern N )
⑩XSLT (pattern N) return
⑫ Viz.xmlfinal result
Policy Enforcement Point
Meta data service
②search
③result
PenetratorServlet①searc
h
Viz.xml( ID 1 ) Viz.xml
( ID 2 )
XML repository
XML repository
Viz.xml
④Viz.xml
Attribute certificate
Attribute certificatePERMIS
XSLT acquisition
service
Filtering Function
⑥Proxy certificate ⑨XSLT ( pattern N )
GT4
GAMAserverGAMAserver
middleware that achieve access control function easily
⑪ Filtered Viz.xml file
④User ID
⑦search attribute certificate
Tomcat
Gridsphere
GAMA
Experiment of a visualization system using Integrated authorization and authentication middleware
• Visualization and access control system by cooperating with GAMA, PERMIS, and Penetrator seamlessly
Hospital A
Visible result research node
researcher
Doctor
Medial researcher
Medial DB
MedicalInstitute B
Computer center
E-science Platform
Attribute certificate
Access controlusing PERMIS
SimulationserviceVisualization
service
Visualizationservice
simulation resultTransfer service
Media dataTransfer
Volume data retrieval service by Penetrator
SRB service
PERMIS PEP PERMIS PEP PERMIS PEP
PERMIS PEP PERMIS PEP
Research node access service
PERMIS PEP
Authentication method by GAMA
MyProxy
id/passwd
Penetrator Demostration using TDW