SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2,March 2013



       A New Research and Design for Grid Portal
                   Security System
                                             Alireza Souri

  Department of Computer Engineering, East Azarbaijan Science and Research Branch,
                       Islamic Azad University, Tabriz, Iran

                                  Alireza.souri@iauasrb.ac.ir

ABSTRACT
Grid security problem is one of the core issue of grid portal only provides strong grid security system, grid
portal can have continuous growth, just have a certain application value, can guarantee the grid users who
use various resources and services safely which the grid provided. This paper first analyzes the grid portal
security demand, and then design a grid portal security system, finally we research and design its
realization technology based on the user login security, resource scheduling security, data transmission
safety and data safety operation the four aspects.

KEYWORDS
Grid Portal Security, Node authentication, User Login, System structure

1. INTRODUCTION

Grid portal system has large quantities and dynamic variable process. Various resources need
different authentication and authorization mechanism. The task execution by a large process
component, and there are different communication mechanism, resource and user could belong to
multiple organizations, grid belongs to distributed. The attributes which related to the user are
managed by more than one organization space [1]. Grid portal safety feature described above
illustrate it's the problem of security needs is very complex, so we should consider its security
needs.

1.1 Basic Security Needs

Grid portal system security elements include: integrity, access control, privacy, identification,
usability, non-repudiation.

Integrity is to ensure that the grid data cannot be inserted, malicious modifying and deleted etc.
Access control is to control and restrict user's ability to access the grid resources. Confidentiality
refers to protecting the grid data from attacking during the transmission process. Identification is
that we identify authentication to the interactive objects of grid system, preventing personate
making false services. Usability is to prevent the usability of grid portal to reduce and prevent
other attacks.




DOI:10.5121/ijfcst.2013.3203                                                                              23
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013
1.2 Special Security Needs

The user group is huge and has an imperfect authentication. Grid portal resources and
organization are large, to facilitate the huge number set of relation between the organization and
account management, each user must have an identity. A local user identity and the grid portal
identity, and user appointed the identity of the remote resources, which all to match, still need to
building trust relationship, these are all very difficult.

Authorization mechanism is imperfect. Agent mechanism is without good scalability, too weak, it
is difficult to support dispersive and the huge number of u.sem and service resources.Security
mechanism is diversified. The grid enterprise each has different security mechanism. Each
enterprise should make its resource adapted to grid environment, when the user access, security
architecture should verify user data, and translated into the required form.Safety measures lack
adaptability. Grid trusting relation is dynamic; it will also affect resource safety [2].

2. Grid Portal Safety Design

2.1. Grid Security Architecture Design

Through analysis and study of above security needs, this article designs the grid security
architecture, and it is divided into four layers as Figure l shows:




                                    Figure 1. Grid security architecture
1. The bottom is a node safety autonomous management layer. Based on node security service in
global identity authentication and global access control it provides 'node identity authentication
                                                                                                           24
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013
and access control services. Grid node access control strategy management can realize the
independent authorization management to local resources.

2. Centralizing management platform security infrastructure layer that it includes security
agreement, PKI certificate management, and grid trusting model management. Global strategy,
especially access control strategy definition, exchange, management, etc. Related units in a grid
management include grid users, roles, and organization and so on.

3. Centralized management platform for global security service layer. Based on grid global
management security infrastructure layer, it provides several global security services, including
the identity authentication services, access control services, audit service, etc.

4. Application-oriented security services entrance. Grid Security Services portal to accept service
requests, call the security service, or application start agent service requests, and sometimes the
grid need to make cross domain service requests.

Meanwhile, there's a supporting environment in the GSec (Grid Security) architecture, the
supporting environment in GSec whole hierarchy can be used as GSec technical support,
including Internet / Intranet / Extranet network environment, GSec basic agreements (such as grid
protocol , network protocols, etc.), standards and norms (such as the enterprise standard, national
standard, international standards and norms, network and information security standards, grid
standards and grid, etc), development platforms (such as GSI, Tomcat, etc.), providing basic
operating environment for the realization o f security service in GSec.
Grid security system structure (Figure 1) features as follows:

1. using the node layer, base layer, service layer and application layer four-story structure, and
rely on the existing platform, standards and norms as a support environment; the node layer
realization services for local security management; global security services layer provides global
security services, including authentication, the global authorization, etc; base layer to provide
security for the security services infrastructure; application layer, requests for an interview;
supporting environment provides a unified norms, standards and existing technology platforms.

2. Centralized, management and autonomous control: grid with a global centralized, management
and local self-control security system framework. Grid service node after the service
encapsulated, the service registers in the grid virtual domain and even the whole world grid in
order to achieve shared. Grid management platform provide centralized management.
Middleware of centralized management platforms provides task decomposition, workflow
management and other services, besides it provides security services. Centralized management
platform infrastructure provides third-party security intermediary, to achieve the certificate,
strategy and organization and management, global security services to enhance authentication and
access control. But the grid node can control the local shared services independently. Shared
services require authorized by the local node before they can use [3].

3. Combination of professional and versatility: grid-based security architecture analysis of the
characteristics of the grid, according to the security needs of the grid and provide new features or
enhance existing security services. Based on universal grid security infrastructure, strengthen the
professionalism of the field grid.

4. Comprehensive and comprehensive combination: to provide a full range of secu.ity, focus on
improving and strengthening authentication and access control security services. According to the
characteristics and needs of the grid, the grid security research focuses on basic authentication


                                                                                                           25
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013
and authorization services. Others, such as auditing, data encryption and so on, because there is
no special needs, using the basic grid security technology.

2.2. User Login Security Design

Enterprises authorized provider permission to use the application service; grid security system
must meet the "single sign-on (SSO)".users login grid system, and see the authorized content.
User need only once authentication in the initial login, access to and use of resources, and free
resources, internal communication to the user without further authentication. The user's password,
keys, etc. must be protected, requiring security measures to ensure that login is real suppliers, so
requiring authentication and access control.

Figure 2 is user login authentication. In grid portal, in order to ensure user login security,
requiring prior completion of application and issuance of identify documents in the authentication
institutions CA. When the user login, based on digital certificate by SSL/TLS security agreement,
completed identity authentication and making users have lawful access user login system.




                         Figure. 2: User entity certification and agent certification




Grid portal identity authentication implementation process is based on authentication protocol,
that different contexts match the different authentication process [4]. Through research, design
their implementation process as Figure.3 shows.



                                                                                                           26
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013
The first step, determine authentication subject categories, authentication subject is users or
nodes. If it is a node, it must provide node certificate to pass identify authentication. Node
certificate for special occasions, such as signed an agreement can use such node certificate.
The second step, determine the object of user access. If the object is node, then use the certificate
authentication method. If the object is a centralized management platform, then search dynamic
organization. If the user's dynamic organization is running, state needed to further determine the
user's access object security level.




                              Figure. 3: Grid portal identity authentication execution

The third step, according to the object security level to determine the identity of the user
authentication method.




                                                                                                           27
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013
2.3. Research on Resource scheduling and security of data Transmission

Enterprise applies services through the Grid portal, the system schedule grid resources; complete
a grid Service dynamically, in the process should ensure the resource scheduled safely. When
apply grid services, firstly, register enterprises user identity in the certification authority CA
achieve an identity certificate, and then in the registration system, the appropriate allocation of
resources to the enterprise access, dynamic allocation of resource to complete security properties
verification, so that resources scheduling process of the access control can be realized.

After enterprise applied the grid system service application, we need to use automatic data
extraction synchronous and interface entry tool these two methods to transfer and saved data to
the grid system, involved some of core data transmission from the enterprise to the grid, and
should be transparent and secure storage to the appropriate resources in this series of processes
require security measures, In order to solve these problems, you can use security protocol which
is based on SSL/TLS in client or storage terminal ,which work between the application layer, and
transport layer, after certificated, provide a secure channel for data communications to ensure
security of data transmission.

2.4. Data Safety Design

In the grid portal, customer data is stored on his computer, the client keep a part of the data,
during the actual use, these data are combined together, it is necessary to ensure that client data
cannot be used by other customers, therefore, requiring to solve data manipulation security
problems. Response to these security issues, combined with the security needs of the grid portal,
this paper to designed grid business process security scheme shown in Figure 4.




                             Figure. 4: Grid business process security scheme
Figure 4 is the grid operation flow diagram, picture includes four entities.
    • Service terminal users: grid portal enterprise or individual;
    • Identity providers: management domain users of the system in;
    • Service provider :provides grid for data and business services;

                                                                                                           28
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013
      •   Discovery Service Provider: User management domain Union.

After users login the grid portal, they will go to step-1 to access services. Access control center of
service provider side will check if it's authenticated. If it is, turn to step 6 to access resources
directly, if not return to the step-2 service discovery access, redirect users to discovery service
providers, then step-3 is the certification redirection is to redirect the user to the identity providers
SSO authentication services, after move to step-4, lf certified it will submit to the service provider
authentication assertion response. If the service provider requires more information, they can
achieve through step-5 properties assertion request and response. When a user requests the
service, since all data is managed through the encryption and decryption driven, so the user data
is secure, which were to step-7 secure transmission of data.

3. CONCLUSIONS

This paper first analyzes the grid portal security demand, and then design a grid portal security
system, finally we research and design its realization technology based on the user login security,
resource scheduling security , data transmission safety and data safety operation the four aspects.

REFERENCES
[1]   Zou Chengwu. (2008) "Grid Security Gateway Research and Application Based on PKI&RBAC",
      journal of Jiangxi normal university. Master Degree theses.
[2]   Liu Shijun, Wu Lei, Meng Xiangxu. (2009) "Manufacturing Grid", Beijing: Publishing House of
      Electronics Industry, pp: 18-20.
[3]   Li Fangmi, (2007) "Grid Portal Scheduling Problem Management System Research and
      Implementation", Wuhan University of technology, Master Degree theses.
[4]   Wang Tongyang, Qin Baoan, Wu Junjun. (2006) "Manufacturing Grid and Key Technology",
      Computer Application and Software, vol. 2 issue.2, pp: 55-58.

Authors

Alireza Souri received his B.Sc. in Computer Engineering University College of
Nabi Akram, Iran in 2011. Currently, he is receiving M.Sc. in Software Engineering
from East Azarbaijan Science and Research Branch, Islamic Azad University in
Iran. His main interest is in the formal verification, modeling and analyzing
Network systems, Multilayer systems, Antivirus systems, Grid computing, and
Real-time systems. He is member of The Society of Digital Information and
Wireless Communications.




                                                                                                           29

More Related Content

What's hot

Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Editor IJARCET
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...1crore projects
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...IJCSIS Research Publications
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceIRJET Journal
 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Editor IJARCET
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...IJwest
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access controlJyotishkar Dey
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access controlJyotishkar Dey
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql databasegourav kottawar
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 

What's hot (20)

Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
 
Bn31437444
Bn31437444Bn31437444
Bn31437444
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Database Security
Database SecurityDatabase Security
Database Security
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
Database security
Database securityDatabase security
Database security
 
375 378
375 378375 378
375 378
 
Database security
Database securityDatabase security
Database security
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 

Viewers also liked

Business Process Simulation - How to get value out of it (bpm portugal 2013)
Business Process Simulation - How to get value out of it (bpm portugal 2013)Business Process Simulation - How to get value out of it (bpm portugal 2013)
Business Process Simulation - How to get value out of it (bpm portugal 2013)Denis Gagné
 
How to register on startup india portal and Mobile App
How to register on startup india portal and Mobile AppHow to register on startup india portal and Mobile App
How to register on startup india portal and Mobile AppMyOnlineCA.in
 
Creating Strategic Value with BPM in HR
Creating Strategic Value with BPM in HRCreating Strategic Value with BPM in HR
Creating Strategic Value with BPM in HRBonitasoft
 
Which BPMS Is Right For You?
Which BPMS Is Right For You?Which BPMS Is Right For You?
Which BPMS Is Right For You?brsilver
 
CustomSoft’s Online Course Portal for Campus
CustomSoft’s Online Course Portal for CampusCustomSoft’s Online Course Portal for Campus
CustomSoft’s Online Course Portal for CampusCustom Soft
 
BPM BlueWorks Workshop Scenario
BPM BlueWorks Workshop ScenarioBPM BlueWorks Workshop Scenario
BPM BlueWorks Workshop ScenarioMarc Jouve
 
A step by-step process to design and manage a successful sap bi implementatio...
A step by-step process to design and manage a successful sap bi implementatio...A step by-step process to design and manage a successful sap bi implementatio...
A step by-step process to design and manage a successful sap bi implementatio...Xoomworks Business Intelligence
 
Portal strategy
Portal strategyPortal strategy
Portal strategyKim Parker
 
Help and Services Portal - Design Process
Help and Services Portal - Design ProcessHelp and Services Portal - Design Process
Help and Services Portal - Design Processjtcchan
 
Scenario Mapping Introduction
Scenario Mapping IntroductionScenario Mapping Introduction
Scenario Mapping Introductionbobweber
 
Introduction to Business Process Management Suite
Introduction to Business Process Management SuiteIntroduction to Business Process Management Suite
Introduction to Business Process Management SuiteAppian
 
Design of a web portal for farmer's insurance company
Design of a web portal for farmer's insurance companyDesign of a web portal for farmer's insurance company
Design of a web portal for farmer's insurance companyNirav Desai
 
A Step By Step Guide Creating A Bpm Scenario In Sap Exchange Infrastructure...
A Step By Step Guide   Creating A Bpm Scenario In Sap Exchange Infrastructure...A Step By Step Guide   Creating A Bpm Scenario In Sap Exchange Infrastructure...
A Step By Step Guide Creating A Bpm Scenario In Sap Exchange Infrastructure...Kevin Wilson
 
Portal UI Design Patterns
Portal UI Design PatternsPortal UI Design Patterns
Portal UI Design PatternsDavid Simpson
 
Introduction to Intranet Planning
Introduction to Intranet PlanningIntroduction to Intranet Planning
Introduction to Intranet PlanningHaaron Gonzalez
 
Business Process Management Using The Open-Source Toolset
Business Process Management Using The Open-Source ToolsetBusiness Process Management Using The Open-Source Toolset
Business Process Management Using The Open-Source ToolsetAdeel Javed
 
Introduction to BPM, Business Process Management, BPM
Introduction to BPM, Business Process Management, BPMIntroduction to BPM, Business Process Management, BPM
Introduction to BPM, Business Process Management, BPMSarbashrestha Panda
 

Viewers also liked (18)

Business Process Simulation - How to get value out of it (bpm portugal 2013)
Business Process Simulation - How to get value out of it (bpm portugal 2013)Business Process Simulation - How to get value out of it (bpm portugal 2013)
Business Process Simulation - How to get value out of it (bpm portugal 2013)
 
How to register on startup india portal and Mobile App
How to register on startup india portal and Mobile AppHow to register on startup india portal and Mobile App
How to register on startup india portal and Mobile App
 
Creating Strategic Value with BPM in HR
Creating Strategic Value with BPM in HRCreating Strategic Value with BPM in HR
Creating Strategic Value with BPM in HR
 
Which BPMS Is Right For You?
Which BPMS Is Right For You?Which BPMS Is Right For You?
Which BPMS Is Right For You?
 
CustomSoft’s Online Course Portal for Campus
CustomSoft’s Online Course Portal for CampusCustomSoft’s Online Course Portal for Campus
CustomSoft’s Online Course Portal for Campus
 
BPM BlueWorks Workshop Scenario
BPM BlueWorks Workshop ScenarioBPM BlueWorks Workshop Scenario
BPM BlueWorks Workshop Scenario
 
A step by-step process to design and manage a successful sap bi implementatio...
A step by-step process to design and manage a successful sap bi implementatio...A step by-step process to design and manage a successful sap bi implementatio...
A step by-step process to design and manage a successful sap bi implementatio...
 
Portal strategy
Portal strategyPortal strategy
Portal strategy
 
Educational Portal
Educational PortalEducational Portal
Educational Portal
 
Help and Services Portal - Design Process
Help and Services Portal - Design ProcessHelp and Services Portal - Design Process
Help and Services Portal - Design Process
 
Scenario Mapping Introduction
Scenario Mapping IntroductionScenario Mapping Introduction
Scenario Mapping Introduction
 
Introduction to Business Process Management Suite
Introduction to Business Process Management SuiteIntroduction to Business Process Management Suite
Introduction to Business Process Management Suite
 
Design of a web portal for farmer's insurance company
Design of a web portal for farmer's insurance companyDesign of a web portal for farmer's insurance company
Design of a web portal for farmer's insurance company
 
A Step By Step Guide Creating A Bpm Scenario In Sap Exchange Infrastructure...
A Step By Step Guide   Creating A Bpm Scenario In Sap Exchange Infrastructure...A Step By Step Guide   Creating A Bpm Scenario In Sap Exchange Infrastructure...
A Step By Step Guide Creating A Bpm Scenario In Sap Exchange Infrastructure...
 
Portal UI Design Patterns
Portal UI Design PatternsPortal UI Design Patterns
Portal UI Design Patterns
 
Introduction to Intranet Planning
Introduction to Intranet PlanningIntroduction to Intranet Planning
Introduction to Intranet Planning
 
Business Process Management Using The Open-Source Toolset
Business Process Management Using The Open-Source ToolsetBusiness Process Management Using The Open-Source Toolset
Business Process Management Using The Open-Source Toolset
 
Introduction to BPM, Business Process Management, BPM
Introduction to BPM, Business Process Management, BPMIntroduction to BPM, Business Process Management, BPM
Introduction to BPM, Business Process Management, BPM
 

Similar to A New Research and Design for Grid Portal Security System

International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloudeSAT Publishing House
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...ijcnes
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 

Similar to A New Research and Design for Grid Portal Security System (20)

International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 

More from ijfcstjournal

A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSijfcstjournal
 
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGA LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGijfcstjournal
 

More from ijfcstjournal (20)

A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
 
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGA LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

A New Research and Design for Grid Portal Security System

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2,March 2013 A New Research and Design for Grid Portal Security System Alireza Souri Department of Computer Engineering, East Azarbaijan Science and Research Branch, Islamic Azad University, Tabriz, Iran Alireza.souri@iauasrb.ac.ir ABSTRACT Grid security problem is one of the core issue of grid portal only provides strong grid security system, grid portal can have continuous growth, just have a certain application value, can guarantee the grid users who use various resources and services safely which the grid provided. This paper first analyzes the grid portal security demand, and then design a grid portal security system, finally we research and design its realization technology based on the user login security, resource scheduling security, data transmission safety and data safety operation the four aspects. KEYWORDS Grid Portal Security, Node authentication, User Login, System structure 1. INTRODUCTION Grid portal system has large quantities and dynamic variable process. Various resources need different authentication and authorization mechanism. The task execution by a large process component, and there are different communication mechanism, resource and user could belong to multiple organizations, grid belongs to distributed. The attributes which related to the user are managed by more than one organization space [1]. Grid portal safety feature described above illustrate it's the problem of security needs is very complex, so we should consider its security needs. 1.1 Basic Security Needs Grid portal system security elements include: integrity, access control, privacy, identification, usability, non-repudiation. Integrity is to ensure that the grid data cannot be inserted, malicious modifying and deleted etc. Access control is to control and restrict user's ability to access the grid resources. Confidentiality refers to protecting the grid data from attacking during the transmission process. Identification is that we identify authentication to the interactive objects of grid system, preventing personate making false services. Usability is to prevent the usability of grid portal to reduce and prevent other attacks. DOI:10.5121/ijfcst.2013.3203 23
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013 1.2 Special Security Needs The user group is huge and has an imperfect authentication. Grid portal resources and organization are large, to facilitate the huge number set of relation between the organization and account management, each user must have an identity. A local user identity and the grid portal identity, and user appointed the identity of the remote resources, which all to match, still need to building trust relationship, these are all very difficult. Authorization mechanism is imperfect. Agent mechanism is without good scalability, too weak, it is difficult to support dispersive and the huge number of u.sem and service resources.Security mechanism is diversified. The grid enterprise each has different security mechanism. Each enterprise should make its resource adapted to grid environment, when the user access, security architecture should verify user data, and translated into the required form.Safety measures lack adaptability. Grid trusting relation is dynamic; it will also affect resource safety [2]. 2. Grid Portal Safety Design 2.1. Grid Security Architecture Design Through analysis and study of above security needs, this article designs the grid security architecture, and it is divided into four layers as Figure l shows: Figure 1. Grid security architecture 1. The bottom is a node safety autonomous management layer. Based on node security service in global identity authentication and global access control it provides 'node identity authentication 24
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013 and access control services. Grid node access control strategy management can realize the independent authorization management to local resources. 2. Centralizing management platform security infrastructure layer that it includes security agreement, PKI certificate management, and grid trusting model management. Global strategy, especially access control strategy definition, exchange, management, etc. Related units in a grid management include grid users, roles, and organization and so on. 3. Centralized management platform for global security service layer. Based on grid global management security infrastructure layer, it provides several global security services, including the identity authentication services, access control services, audit service, etc. 4. Application-oriented security services entrance. Grid Security Services portal to accept service requests, call the security service, or application start agent service requests, and sometimes the grid need to make cross domain service requests. Meanwhile, there's a supporting environment in the GSec (Grid Security) architecture, the supporting environment in GSec whole hierarchy can be used as GSec technical support, including Internet / Intranet / Extranet network environment, GSec basic agreements (such as grid protocol , network protocols, etc.), standards and norms (such as the enterprise standard, national standard, international standards and norms, network and information security standards, grid standards and grid, etc), development platforms (such as GSI, Tomcat, etc.), providing basic operating environment for the realization o f security service in GSec. Grid security system structure (Figure 1) features as follows: 1. using the node layer, base layer, service layer and application layer four-story structure, and rely on the existing platform, standards and norms as a support environment; the node layer realization services for local security management; global security services layer provides global security services, including authentication, the global authorization, etc; base layer to provide security for the security services infrastructure; application layer, requests for an interview; supporting environment provides a unified norms, standards and existing technology platforms. 2. Centralized, management and autonomous control: grid with a global centralized, management and local self-control security system framework. Grid service node after the service encapsulated, the service registers in the grid virtual domain and even the whole world grid in order to achieve shared. Grid management platform provide centralized management. Middleware of centralized management platforms provides task decomposition, workflow management and other services, besides it provides security services. Centralized management platform infrastructure provides third-party security intermediary, to achieve the certificate, strategy and organization and management, global security services to enhance authentication and access control. But the grid node can control the local shared services independently. Shared services require authorized by the local node before they can use [3]. 3. Combination of professional and versatility: grid-based security architecture analysis of the characteristics of the grid, according to the security needs of the grid and provide new features or enhance existing security services. Based on universal grid security infrastructure, strengthen the professionalism of the field grid. 4. Comprehensive and comprehensive combination: to provide a full range of secu.ity, focus on improving and strengthening authentication and access control security services. According to the characteristics and needs of the grid, the grid security research focuses on basic authentication 25
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013 and authorization services. Others, such as auditing, data encryption and so on, because there is no special needs, using the basic grid security technology. 2.2. User Login Security Design Enterprises authorized provider permission to use the application service; grid security system must meet the "single sign-on (SSO)".users login grid system, and see the authorized content. User need only once authentication in the initial login, access to and use of resources, and free resources, internal communication to the user without further authentication. The user's password, keys, etc. must be protected, requiring security measures to ensure that login is real suppliers, so requiring authentication and access control. Figure 2 is user login authentication. In grid portal, in order to ensure user login security, requiring prior completion of application and issuance of identify documents in the authentication institutions CA. When the user login, based on digital certificate by SSL/TLS security agreement, completed identity authentication and making users have lawful access user login system. Figure. 2: User entity certification and agent certification Grid portal identity authentication implementation process is based on authentication protocol, that different contexts match the different authentication process [4]. Through research, design their implementation process as Figure.3 shows. 26
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013 The first step, determine authentication subject categories, authentication subject is users or nodes. If it is a node, it must provide node certificate to pass identify authentication. Node certificate for special occasions, such as signed an agreement can use such node certificate. The second step, determine the object of user access. If the object is node, then use the certificate authentication method. If the object is a centralized management platform, then search dynamic organization. If the user's dynamic organization is running, state needed to further determine the user's access object security level. Figure. 3: Grid portal identity authentication execution The third step, according to the object security level to determine the identity of the user authentication method. 27
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013 2.3. Research on Resource scheduling and security of data Transmission Enterprise applies services through the Grid portal, the system schedule grid resources; complete a grid Service dynamically, in the process should ensure the resource scheduled safely. When apply grid services, firstly, register enterprises user identity in the certification authority CA achieve an identity certificate, and then in the registration system, the appropriate allocation of resources to the enterprise access, dynamic allocation of resource to complete security properties verification, so that resources scheduling process of the access control can be realized. After enterprise applied the grid system service application, we need to use automatic data extraction synchronous and interface entry tool these two methods to transfer and saved data to the grid system, involved some of core data transmission from the enterprise to the grid, and should be transparent and secure storage to the appropriate resources in this series of processes require security measures, In order to solve these problems, you can use security protocol which is based on SSL/TLS in client or storage terminal ,which work between the application layer, and transport layer, after certificated, provide a secure channel for data communications to ensure security of data transmission. 2.4. Data Safety Design In the grid portal, customer data is stored on his computer, the client keep a part of the data, during the actual use, these data are combined together, it is necessary to ensure that client data cannot be used by other customers, therefore, requiring to solve data manipulation security problems. Response to these security issues, combined with the security needs of the grid portal, this paper to designed grid business process security scheme shown in Figure 4. Figure. 4: Grid business process security scheme Figure 4 is the grid operation flow diagram, picture includes four entities. • Service terminal users: grid portal enterprise or individual; • Identity providers: management domain users of the system in; • Service provider :provides grid for data and business services; 28
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.2, March 2013 • Discovery Service Provider: User management domain Union. After users login the grid portal, they will go to step-1 to access services. Access control center of service provider side will check if it's authenticated. If it is, turn to step 6 to access resources directly, if not return to the step-2 service discovery access, redirect users to discovery service providers, then step-3 is the certification redirection is to redirect the user to the identity providers SSO authentication services, after move to step-4, lf certified it will submit to the service provider authentication assertion response. If the service provider requires more information, they can achieve through step-5 properties assertion request and response. When a user requests the service, since all data is managed through the encryption and decryption driven, so the user data is secure, which were to step-7 secure transmission of data. 3. CONCLUSIONS This paper first analyzes the grid portal security demand, and then design a grid portal security system, finally we research and design its realization technology based on the user login security, resource scheduling security , data transmission safety and data safety operation the four aspects. REFERENCES [1] Zou Chengwu. (2008) "Grid Security Gateway Research and Application Based on PKI&RBAC", journal of Jiangxi normal university. Master Degree theses. [2] Liu Shijun, Wu Lei, Meng Xiangxu. (2009) "Manufacturing Grid", Beijing: Publishing House of Electronics Industry, pp: 18-20. [3] Li Fangmi, (2007) "Grid Portal Scheduling Problem Management System Research and Implementation", Wuhan University of technology, Master Degree theses. [4] Wang Tongyang, Qin Baoan, Wu Junjun. (2006) "Manufacturing Grid and Key Technology", Computer Application and Software, vol. 2 issue.2, pp: 55-58. Authors Alireza Souri received his B.Sc. in Computer Engineering University College of Nabi Akram, Iran in 2011. Currently, he is receiving M.Sc. in Software Engineering from East Azarbaijan Science and Research Branch, Islamic Azad University in Iran. His main interest is in the formal verification, modeling and analyzing Network systems, Multilayer systems, Antivirus systems, Grid computing, and Real-time systems. He is member of The Society of Digital Information and Wireless Communications. 29