Securing a HENP Computing Facility
نویسنده
چکیده
Traditionally, HENP computing facilities have been open facilities that are accessed in many different ways by users that are both internal and external to the facility. However, the need to protect the facility from cybersecurity threats has made it difficult to maintain the openness of the facility to off-site and on-site users. In this paper, we discuss the strategy we have used and the architecture we have developed and deployed to increase the security the US ATLAS and RHIC Computing Facilities, while trying to maintain the openness and accessibility that our user community has come to expect. Included in this discussion are the tools that we have used and the operational experience we have had with the deployed architecture.
منابع مشابه
Bilevel Architecture for High-Throughput Computing
We have prototyped and analyzed design of a novel approach for the high throughput computing – a core element for the emerging HENP computational grid. Independent event processing in HENP is well suited for computing in parallel. The prototype facilitates use of inexpensive mass-market components by providing fault tolerant resilience (instead of the expensive total system reliability) via hig...
متن کاملIncreasing Security in Cloud Environment
The concept of cloud computing was introduced to meet the increase in demand for new application for a project, and to provide a large storage facility whenever or wherever a user needs it. The cloud system facility helped many industries as well as individual users to get authentic software at a very low cost. But with this new system comes the major concern of security, as the connection to t...
متن کاملStrongbox : a self-securing protection system for distributed programs
We introduce a new method of approaching security in distributed systems: self-securing programs. These programs run securely on distributed operating systems which provide only minimal security facilities. We have built a system called Strongbox to support self-securing programs on Mach, a distributed operating system, and Camelot, a distributed transaction facility. Strongbox uses negligible ...
متن کاملSecurity of Transportation Networks: Modeling Attacker-Defender Interaction
Transportation networks are increasingly facing new security threats due to the vulnerabilities of cyber-physical components that support their operation. In this article, we aim to understand how the network operator (defender) should prioritize the investment in securing a set of facilities in order to limit the impact of a strategic adversary (attacker) who can target a facility to increase ...
متن کاملCollaborative Tools for the LHC: Update On Recent Activities
I report on current activities in the domain of Collaborative Tools, focusing on development for the LHC collaborations [1] and HENP (High Energy and Nuclear Physics), in general, including audio and video conferencing, web archiving, and secure collaborative environments. This note addresses the follow-up to the LCG RTAG 12 Final Report [2] (presented at CHEP 2006 [3]), including formation of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003