12โ€“16 Apr 2010
Uppsala University
Europe/Stockholm timezone

Session

Security

12 Apr 2010, 15:30
Uppsala University

Uppsala University

Description

An overview of the latest advances in security and several related mechanisms on Grid infrastructures will be given during the session. Developments on monitoring and administration of security related operations as well as user tools to better manage digital certificates and encryption of sensitive information will be presented. Several presentations during the poster session also cover and provide insight on new tools on credential management and proxy delegation.

Presentation materials

  1. Dr Stuart Kenny (TCD)
    12/04/2010, 15:30
    Software services exploiting and/or extending grid middleware (gLite, ARC, UNICORE etc)
    Oral
    To date, grid security activities have largely focused on prevention mechanisms, i.e., authorization,authentication, and secure communications. Here we present an Active Security Infrastructure (ASI) for grids, the design of which focuses on the areas of detection (e.g. intrusion detection), and reaction, i.e., taking action to prevent, or to recover from, a security incident. The...
    Go to contribution page
  2. John White White (Helsinki Institute of Physics HIP)
    12/04/2010, 15:50
    Software services exploiting and/or extending grid middleware (gLite, ARC, UNICORE etc)
    Oral
    Biomedical researchers are required to encrypt sensistive patient data before use/storage on Grid Data Management services. The services described enable this operation.
    Go to contribution page
  3. Dr Stefano Dal Pra (INFN)
    12/04/2010, 16:10
    Software services exploiting and/or extending grid middleware (gLite, ARC, UNICORE etc)
    Oral
    Sanctorum is a python tool created to aid sitemanagers to safely manage digital certificates and passwords for hosts in a farm. Motivation for the tool: when releasing a new host certificate, the Italian Certification Authority recommends the site to maintain two backup copies of the private key in a safe place not network reachable. This makes it quite difficult to both respect the CA rule...
    Go to contribution page
  4. Mr Henri Mikkonen (Helsinki Institute of Physics HIP)
    12/04/2010, 16:30
    Software services exploiting and/or extending grid middleware (gLite, ARC, UNICORE etc)
    Oral
    The Grid computing model provides Grid users a way to use resources that are not usually owned by their parent organizations. The use of Grid resources entails a balance between the resource owner's need to oversee and account for the resource usage and the user's privacy requirements. From the user's point of view, complete anonymity is desirable, but not possible due to requirements like...
    Go to contribution page
Building timetable...