Description
An overview of the latest advances in security and several related mechanisms on Grid infrastructures will be given during the session. Developments on monitoring and administration of security related operations as well as user tools to better manage digital certificates and encryption of sensitive information will be presented. Several presentations during the poster session also cover and provide insight on new tools on credential management and proxy delegation.
Dr
Stuart Kenny
(TCD)
12/04/2010, 15:30
Software services exploiting and/or extending grid middleware (gLite, ARC, UNICORE etc)
Oral
To date, grid security activities have largely focused on prevention mechanisms, i.e., authorization,authentication, and secure communications. Here we present an Active Security Infrastructure (ASI) for grids, the design of which focuses on the areas of detection (e.g. intrusion detection), and reaction, i.e., taking action to prevent, or to recover from, a security incident. The...
John White White
(Helsinki Institute of Physics HIP)
12/04/2010, 15:50
Software services exploiting and/or extending grid middleware (gLite, ARC, UNICORE etc)
Oral
Biomedical researchers are required to encrypt sensistive patient data before use/storage on Grid Data Management services. The services described enable this operation.
Dr
Stefano Dal Pra
(INFN)
12/04/2010, 16:10
Software services exploiting and/or extending grid middleware (gLite, ARC, UNICORE etc)
Oral
Sanctorum is a python tool created to aid sitemanagers to safely manage digital certificates and passwords for hosts in a farm. Motivation for the tool: when releasing a new host certificate, the Italian Certification Authority recommends the site to maintain two backup copies of the private key in a safe place not network reachable. This makes it quite difficult to both respect the CA rule...
Mr
Henri Mikkonen
(Helsinki Institute of Physics HIP)
12/04/2010, 16:30
Software services exploiting and/or extending grid middleware (gLite, ARC, UNICORE etc)
Oral
The Grid computing model provides Grid users a way to use resources that are not usually owned by their parent organizations. The use of Grid resources entails a balance between the resource owner's need to oversee and account for the resource usage and the user's privacy requirements. From the user's point of view, complete anonymity is desirable, but not possible due to requirements like...