508 research outputs found

    The LDAP URL Format

    Full text link

    Implementació de Serveis Telemàtics Bàsics

    Get PDF
    El projecte Implementació de Serveis Telemàtics Bàsics exposa una solució integral i centralitzada que instal·la i gestiona de manera ràpida i senzilla un servidor que ofereix serveis telemàtics bàsics. Els serveis de xarxa orientats a l'usuari engloben el servei web, el servei de correu, el servei de transferència de fitxers i el servei de missatgeria instantània. Els serveis orientats al treball en xarxa són aquells serveis que són transparents per a l'usuari, però indispensables per al funcionament de la resta de serveis. Aquests serveis són: el servei de màquines virtuals, el servei d'autenticació, el servei de resolució de noms i el servei de base de dades. La implantació d'aquesta solució aconsegueix classificar els dominis d'Internet que un servidor ha d'administrar, i adjudicar-li o no els serveis abans descrits, així com el manteniment dels usuaris de cada domini. A més, dins de cada domini, es garanteix la unicitat d'usuaris

    Directory-Enabled Networking Design Reference

    Full text link

    Emanager - Cdo Made Simple

    Get PDF
    The eManager application integrates the existing enforcement systems and MS Exchange Server 2003. The application exploits the benefits of CDO, ADO, LDAP, ADSI, XML and COM technologies. The application explicates the integration and utilization of CDO using VC++ programming language. It illustrates how CDO can be implemented effectively in various circumstances while maintaining uncomplicated application design and solutions. It demonstrates how CDO and ADO complements each other and interacts with other Windows artifacts such as ADSI, LDAP and Active Directory. The application implements the COM methodology that establishes the COM events using connection points and sinks. The integration and management of process and threads using events is the prim benefit for application programmers. Keywords: CDO ADO LDAP ADSI COM Events Sink Process Thread Active Directory Connection Poin

    My private cloud--granting federated access to cloud resources

    Get PDF
    We describe the research undertaken in the six month JISC/EPSRC funded My Private Cloud project, in which we built a demonstration cloud file storage service that allows users to login to it, by using their existing credentials from a configured trusted identity provider. Once authenticated, users are shown a set of accounts that they are the owners of, based on their identity attributes. Once users open one of their accounts, they can upload and download files to it. Not only that, but they can then grant access to their file resources to anyone else in the federated system, regardless of whether their chosen delegate has used the cloud service before or not. The system uses standard identity management protocols, attribute based access controls, and a delegation service. A set of APIs have been defined for the authentication, authorisation and delegation processes, and the software has been released as open source to the community. A public demonstration of the system is available online

    Enhanced security architecture for support of credential repository in grid computing.

    Get PDF
    Grid Computing involves heterogeneous computers and resources, multiple administrative domains and the mechanisms and techniques for establishing and maintaining effective and secure communications between devices and systems. Both authentication and authorization are required. Current authorization models in each domain vary from one system to another, which makes it difficult for users to obtain authorization across multiple domains at one time. We propose an enhanced security architecture to provide support for decentralized authorization based on attribute certificates which may be accessed via the Internet. This allows the administration of privileges to be widely distributed over the Internet in support of autonomy for resource owners and providers. In addition, it provides a uniform approach for authorization which may be used by resource providers from various domains. We combine authentication with the authorization mechanism by using both MyProxy online credential repository and LDAP directory server. In our architecture, we use MyProxy server to store identity certificates for authentication, and utilize an LDAP server-based architecture to store attribute certificates for authorization. Using a standard web browser, a user may connect to a grid portal and allow the portal to retrieve those certificates in order to access grid resources on behalf of the user. Thus, our approach can make use of the online credential repository to integrate authentication, delegation and attribute based access control together to provide enhanced, flexible security for grid system. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis2004 .C54. Source: Masters Abstracts International, Volume: 43-01, page: 0231. Adviser: R. D. Kent. Thesis (M.Sc.)--University of Windsor (Canada), 2004

    Managing Large Scale Project Analysis Teams through a Web Accessible Database

    Get PDF
    Large scale space programs analyze thousands of requirements while mitigating safety, performance, schedule, and cost risks. These efforts involve a variety of roles with interdependent use cases and goals. For example, study managers and facilitators identify ground-rules and assumptions for a collection of studies required for a program or project milestone. Task leaders derive product requirements from the ground rules and assumptions and describe activities to produce needed analytical products. Disciplined specialists produce the specified products and load results into a file management system. Organizational and project managers provide the personnel and funds to conduct the tasks. Each role has responsibilities to establish information linkages and provide status reports to management. Projects conduct design and analysis cycles to refine designs to meet the requirements and implement risk mitigation plans. At the program level, integrated design and analysis cycles studies are conducted to eliminate every 'to-be-determined' and develop plans to mitigate every risk. At the agency level, strategic studies analyze different approaches to exploration architectures and campaigns. This paper describes a web-accessible database developed by NASA to coordinate and manage tasks at three organizational levels. Other topics in this paper cover integration technologies and techniques for process modeling and enterprise architectures

    Architecture for data exchange among partially consistent data models

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2002.Includes bibliographical references (leaves 75-76).by Eswar Venkat Ram Prasad Vemulapalli.S.M
    corecore