6 Matching Results

Search Results

Advanced search parameters have been applied.

Anchor Toolkit - a secure mobile agent system

Description: Mobile agent technology facilitates intelligent operation insoftware systems with less human interaction. Major challenge todeployment of mobile agents include secure transmission of agents andpreventing unauthorized access to resources between interacting systems,as either hosts, or agents, or both can act maliciously. The Anchortoolkit, designed by LBNL, handles the transmission and secure managementof mobile agents in a heterogeneous distributed computing environment. Itprovides users with the option of incorporating their security managers.This paper concentrates on the architecture, features, access control anddeployment of Anchor toolkit. Application of this toolkit in a securedistributed CVS environment is discussed as a case study.
Date: May 19, 1999
Creator: Mudumbai, Srilekha S.; Johnston, William & Essiari, Abdelilah
Partner: UNT Libraries Government Documents Department

Securing Resources in Collaborative Environments: A Peer-to-peerApproach

Description: We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.
Date: September 19, 2005
Creator: Berket, Karlo; Essiari, Abdelilah & Thompson, Mary R.
Partner: UNT Libraries Government Documents Department

Peer-to-peer I/O (P2PIO) protocol specification Version 0.6

Description: Today's distributed systems require simple and powerful resource discovery queries in a dynamic environment consisting of a large number of resources spanning many autonomous administrative domains. The distributed search problem is hard due to the variety of query types, the number of resources and their autonomous, partitioned and dynamic nature. We propose a generalized resource discovery framework that is built around an application level messaging protocol called Peer-to-Peer I/O (P2PIO). P2PIO addresses a number of scalability problems in a general way. It provides flexible and uniform transport-independent resource discovery mechanisms to reduce both the client and network burden in multi-hop P2P systems.
Date: April 21, 2004
Creator: Berket, Karlo; Essiari, Abdelilah; Gunter, Dan & Hoschek, Wolfgang
Partner: UNT Libraries Government Documents Department

PKI-based security for peer-to-peer information sharing

Description: The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.
Date: May 2, 2004
Creator: Berket, Karlo; Essiari, Abdelilah & Muratas, Artur
Partner: UNT Libraries Government Documents Department

Authorization policy in a PKI environment

Description: The major emphasis of Public Key Infrastructure has been to provide a cryptographically secure means of authenticating identities. While there are a number of proposed standards for authorization structures and protocols based on X.509 or other key-based identities, none have been widely adopted. As part of an effort to use X.509 identities to provide authorization in highly distributed environments, we have developed and deployed an authorization service based on X.509 identified users and access policy contained in certificates signed by X.509 identified stakeholders. The major goal of this system, called Akenti, is to produce a usable authorization system for an environment consisting of distributed resources used by geographically and administratively distributed users.
Date: April 10, 2002
Creator: Thompson, Mary R.; Mudumbai, Srilekha S.; Essiari, Abdelilah & Chin, Willie
Partner: UNT Libraries Government Documents Department

Fine-grained authorization for job and resource management usingakenti and the globus toolkit(R)

Description: As the Grid paradigm is adopted as a standard way of sharing remote resources across organizational domains, the need for fine-grained access control to these resources increases. This paper presents an authorization solution for job submission and control, developed as part of the National Fusion Collaboratory, that uses the Globus Toolkit 2 and the Akenti authorization service in order to perform fine-grained authorization of job and resource management requests in a Gridenvironment. At job startup, it allows the system to evaluate a user's Resource Specification Language request against authorization policies on resource usage determining how many CPUs or memory a user can use on a given resource or which executables the user can run based on authorization policies, it allows other virtual organization members to manage the user's job.
Date: July 1, 2003
Creator: Thompson, Mary R.; Essiari, Abdelilah; Keahey, Kate; Welch, Von; Lang, S. & Liu, Bo
Partner: UNT Libraries Government Documents Department