11,374 research outputs found

    PSEUDONYMITY SYSTEM ADMINISTRATOR GUIDE

    Get PDF
    EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous identit

    SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE

    Get PDF
    The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token forma

    SOAP Services with Clarens: Guide for Developers and Administrators

    Get PDF
    The Clarens application server enables secure, asynchronous SOAP services to run on a Grid cluster such as one of those of the TeraGrid. There is a Client, who wants to use the service and understands the application domain enough to form a reasonable service request; a Developer, who is a power-user of the TeraGrid, who understands both Clarens and the application domain, and creates and deploys a service on a TeraGrid head node; and there is a Root system administrator, who controls the Clarens installation and the cluster on which it runs. The purpose of this document is to provide all of the information a service developer needs to know in order to deploy a Clarens service, with information also provided for the system administrator of the Clarens installation. First we discuss how each of the three roles see the service

    Wanted: Trained Security Specialists\u27

    Full text link
    This paper looks at security concerns within the IT industry and how to increase student interest in this field of study. One specific activity is presented as a way to expose students to security concerns they are likely to encounter as a system administrator

    ARC Computing Element System Administrator Guide

    Get PDF
    The ARC Computing Element (CE) is an EMI product allowing submission and management of applications running on DCI computational resourc

    System Administrator for LCS Development Sets

    Get PDF
    The Spaceport Command and Control System Project is creating a Checkout and Control System that will eventually launch the next generation of vehicles from Kennedy Space Center. KSC has a large set of Development and Operational equipment already deployed in several facilities, including the Launch Control Center, which requires support. The position of System Administrator will complete tasks across multiple platforms (Linux/Windows), many of them virtual. The Hardware Branch of the Control and Data Systems Division at the Kennedy Space Center uses system administrators for a variety of tasks. The position of system administrator comes with many responsibilities which include maintaining computer systems, repair or set up hardware, install software, create backups and recover drive images are a sample of jobs which one must complete. Other duties may include working with clients in person or over the phone and resolving their computer system needs. Training is a major part of learning how an organization functions and operates. Taking that into consideration, NASA is no exception. Training on how to better protect the NASA computer infrastructure will be a topic to learn, followed by NASA work polices. Attending meetings and discussing progress will be expected. A system administrator will have an account with root access. Root access gives a user full access to a computer system and or network. System admins can remove critical system files and recover files using a tape backup. Problem solving will be an important skill to develop in order to complete the many tasks

    Application for System Administrator of the Mobile Game

    Get PDF
    This article deals with the development of server side architecture of administrator of webbased game application. A web-based application with implemented features for management of server side of administrator was built

    Automatic Detection of Abnormal Behavior in Computing Systems

    Get PDF
    I present RAACD, a software suite that detects misbehaving computers in large computing systems and presents information about those machines to the system administrator. I build this system using preexisting anomaly detection techniques. I evaluate my methods using simple synthesized data, real data containing coerced abnormal behavior, and real data containing naturally occurring abnormal behavior. I find that the system adequately detects abnormal behavior and significantly reduces the amount of uninteresting computer health data presented to a system administrator
    corecore