Zabezpečené Logistické sítě ve virtuálních organizacích
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F63839172%3A_____%2F06%3A00000462" target="_blank" >RIV/63839172:_____/06:00000462 - isvavai.cz</a>
Nalezeny alternativní kódy
RIV/63839172:_____/07:00000607
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Secure Logistical Networking in Virtual Organizations
Popis výsledku v původním jazyce
In this poster, we propose an architecture that extends Logistical Networking to use Grid authentication and authorization services. Our architecture guaranteesthat user is authenticated to all services included in network storage stack, the authorization granularity is also at the service level and all authorizations can be revoked at any moment by service providers. We also support access policies. These can limit maximum amount of distributed storage space allocated to a user or group of users or they can limit the maximum amountof time the client can keep his data within the distributed storage. Advanced access control to files is supported, administrators can define access conditions. The prototype implementation has been used to evaluate overheadassociated with the security enhancements. If only capabilities are encrypted, the Copy command has a notable but constant overhead of 10 ms, all the other basic commands experience no visible overhead. When the full data encryption is e
Název v anglickém jazyce
Secure Logistical Networking in Virtual Organizations
Popis výsledku anglicky
In this poster, we propose an architecture that extends Logistical Networking to use Grid authentication and authorization services. Our architecture guaranteesthat user is authenticated to all services included in network storage stack, the authorization granularity is also at the service level and all authorizations can be revoked at any moment by service providers. We also support access policies. These can limit maximum amount of distributed storage space allocated to a user or group of users or they can limit the maximum amountof time the client can keep his data within the distributed storage. Advanced access control to files is supported, administrators can define access conditions. The prototype implementation has been used to evaluate overheadassociated with the security enhancements. If only capabilities are encrypted, the Copy command has a notable but constant overhead of 10 ms, all the other basic commands experience no visible overhead. When the full data encryption is e
Klasifikace
Druh
A - Audiovizuální tvorba
CEP obor
JC - Počítačový hardware a software
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
Z - Vyzkumny zamer (s odkazem do CEZ)
Ostatní
Rok uplatnění
2007
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
ISBN
—
Místo vydání
—
Název nakladatele resp. objednatele
—
Verze
Poster
Identifikační číslo nosiče
—