562,448 research outputs found

    Security Policies and Procedures for Internet Resources

    Get PDF
    The aim of information resource management is to effectively provide information to the user community for research, education and learning and administrative purposes. There are certain key issues to be taken care of while providing any kind of service like cost effectiveness, network access issues, malicious virus threats and other security issues. The use of and the adherence to certain policies and procedures would make the service more efficient and effective in this context. . Security policies are of immense importance in the Internet environment and the implementation of proper policies can resist virus attacks, employee abuse and theft/destruction. An automated procedure which observes certain significant features like tidiness of HTML formatting, standard conformance, document structure, and metadata elements can help prevent these kinds of problems. Automatic mechanisms could also track some characteristics over time like HTTP response code, response time, page changes, and page relocation and thus could preserve the integrity and quality of the service

    Towards Loop-Free Forwarding of Anonymous Internet Datagrams that Enforce Provenance

    Full text link
    The way in which addressing and forwarding are implemented in the Internet constitutes one of its biggest privacy and security challenges. The fact that source addresses in Internet datagrams cannot be trusted makes the IP Internet inherently vulnerable to DoS and DDoS attacks. The Internet forwarding plane is open to attacks to the privacy of datagram sources, because source addresses in Internet datagrams have global scope. The fact an Internet datagrams are forwarded based solely on the destination addresses stated in datagram headers and the next hops stored in the forwarding information bases (FIB) of relaying routers allows Internet datagrams to traverse loops, which wastes resources and leaves the Internet open to further attacks. We introduce PEAR (Provenance Enforcement through Addressing and Routing), a new approach for addressing and forwarding of Internet datagrams that enables anonymous forwarding of Internet datagrams, eliminates many of the existing DDoS attacks on the IP Internet, and prevents Internet datagrams from looping, even in the presence of routing-table loops.Comment: Proceedings of IEEE Globecom 2016, 4-8 December 2016, Washington, D.C., US

    M-grid: Using Ubiquitous Web Technologies to create a Computational Grid

    No full text
    There are many potential users and uses for grid computing. However, the concept of sharing computing resources excites security concerns and, whilst being powerful and flexible, at least for novices, existing systems are complex to install and use. Together these represent a significant barrier to potential users who are interested to see what grid computing can do. This paper describes m-grid, a system for building a computational grid which can accept tasks from any user with access to a web browser and distribute them to almost any machine with access to the internet and manages to do this without the installation of additional software or interfering with existing security arrangements

    User-oriented security supporting inter-disciplinary life science research across the grid

    Get PDF
    Understanding potential genetic factors in disease or development of personalised e-Health solutions require scientists to access a multitude of data and compute resources across the Internet from functional genomics resources through to epidemiological studies. The Grid paradigm provides a compelling model whereby seamless access to these resources can be achieved. However, the acceptance of Grid technologies in this domain by researchers and resource owners must satisfy particular constraints from this community - two of the most critical of these constraints being advanced security and usability. In this paper we show how the Internet2 Shibboleth technology combined with advanced authorisation infrastructures can help address these constraints. We demonstrate the viability of this approach through a selection of case studies across the complete life science spectrum
    • 

    corecore