seamless, and safe resource management technology osaka university,japan yang shuo kazunori nozaki...

6
SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY Osaka University,Japan Yang Shuo Kazunori Nozaki Shinji Shimojo

Upload: jesse-dillon

Post on 27-Mar-2015

221 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY Osaka University,Japan Yang Shuo Kazunori Nozaki Shinji Shimojo

SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY

Osaka University,JapanYang Shuo

Kazunori Nozaki Shinji Shimojo

Page 2: SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY Osaka University,Japan Yang Shuo Kazunori Nozaki Shinji Shimojo

Penetrator visualization service

Users can apply some annotations here.

BUT,They want to share those annotations depending on their

roles.

Users can apply some annotations here.

BUT,They want to share those annotations depending on their

roles.

Page 3: SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY Osaka University,Japan Yang Shuo Kazunori Nozaki Shinji Shimojo

Necessity of a security source management• The conventional technologies of those access

controls are insufficient for e-Science environments because of the scale and diversity.

Uid: s-dateVO: B

Uid: youVO: A

Annotation

Annotation

Tiled Display Wall VO: A VO: B

Control

Control

Page 4: SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY Osaka University,Japan Yang Shuo Kazunori Nozaki Shinji Shimojo

PERMIS 、 Penetrator Integrated middleware system

4

LDAP server repositoryLDAP server repository

XSLT offered service

Access controlservice

Policy Decision Point

XSLTstyle sheet

XSLTstyle sheet

⑧Reture XSLT Style Sheet

⑤ Proxy certificate

XSLT ( pattern N )

XSLT ( pattern N )

⑩XSLT (pattern N) return

⑫ Viz.xmlfinal result

Policy Enforcement Point

Meta data service

②search

③result

PenetratorServlet①searc

h

Viz.xml( ID 1 ) Viz.xml

( ID 2 )

XML repository

XML repository

Viz.xml

④Viz.xml

Attribute certificate

Attribute certificatePERMIS

XSLT acquisition

service

Filtering Function

⑥Proxy certificate ⑨XSLT ( pattern N )

GT4

GAMAserverGAMAserver

middleware that achieve access control function easily

⑪ Filtered Viz.xml file

④User ID

⑦search attribute certificate

Tomcat

Gridsphere

GAMA

Page 5: SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY Osaka University,Japan Yang Shuo Kazunori Nozaki Shinji Shimojo

Experiment of a visualization system using Integrated authorization and authentication middleware

• Visualization and access control system by cooperating with GAMA, PERMIS, and Penetrator seamlessly

Hospital A

Visible result research node  

researcher  

Doctor  

Medial researcher

Medial DB

MedicalInstitute B

Computer center  

E-science Platform

Attribute certificate

Access controlusing PERMIS

SimulationserviceVisualization

service

Visualizationservice

simulation resultTransfer service

Media dataTransfer

Volume data retrieval service by Penetrator

SRB service

PERMIS PEP PERMIS PEP PERMIS PEP

PERMIS PEP PERMIS PEP

Research node access service

PERMIS PEP

Authentication method by GAMA   

MyProxy

id/passwd

Page 6: SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY Osaka University,Japan Yang Shuo Kazunori Nozaki Shinji Shimojo

Penetrator Demostration using TDW