60 likes | 156 Views
Osaka University,Japan Yang Shuo Kazunori Nozaki Shinji Shimojo. SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY. Penetrator visualization service. Users can apply some annotations here. BUT, They want to share those annotations depending on their roles. Uid: you VO: A.
E N D
Osaka University,Japan Yang Shuo KazunoriNozaki Shinji Shimojo SEAMLESS, AND SAFE RESOURCE MANAGEMENT TECHNOLOGY
Penetrator visualization service Users can apply some annotations here. BUT, They want to share those annotations depending on their roles.
Uid: you VO: A Uid: s-date VO: B Necessity of a security source management Control Annotation Control Annotation VO: A VO: B Tiled Display Wall The conventionaltechnologies of those access controlsare insufficient for e-Science environments because of the scale and diversity.
PERMIS、Penetrator Integrated middleware system Policy Enforcement Point Meta data service middleware that achieve access control function easily Viz.xml (ID 1) Penetrator Servlet Viz.xml (ID 2) ②search ①search Access control service ③result GAMA XML repository ⑫ Viz.xml final result Viz.xml Gridsphere Tomcat ⑪ Filtered Viz.xml file Filtering Function ④Viz.xml ⑩XSLT (pattern N) return ④User ID GAMAserver XSLT acquisition service ⑤Proxy certificate ⑨XSLT( pattern N) ⑥Proxy certificate Policy Decision Point LDAP server repository XSLT offered service GT4 ⑧Reture XSLT Style Sheet XSLTstyle sheet Attribute certificate XSLT(pattern N) ⑦search attribute certificate PERMIS
Visualization service Visualization service Simulation service Research node access service Media data Transfer simulation result Transfer service E-science Platform research node SRB service PERMIS PEP PERMIS PEP PERMIS PEP PERMIS PEP PERMIS PEP PERMIS PEP Experiment of a visualization system using Integrated authorization and authentication middleware • Visualization and access control systemby cooperating with GAMA, PERMIS, and Penetrator seamlessly Computer center Medical Institute B Hospital A Doctor id/passwd researcher Medial researcher Access control using PERMIS Volume data retrieval service by Penetrator Authentication method by GAMA Attribute certificate MyProxy Medial DB Visible result