Configuring Storage Area Networks for Mandatory Security

نویسندگان

  • Benjamin Aziz
  • Simon N. Foley
  • John Herbert
  • Garret Swart
چکیده

Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both environments the network and the storage has to be configured to ensure that the data is maintained securely and can be delivered efficiently. In this paper we describe a model of mandatory security for multi-domain storage services that is flexible enough to reflect the data requirements, tractable for the administrator, and implementable as part of an automatic configuration system. We describe the model abstractly, its implementation as part of a prototype SAN configuration system written in OPL, and illustrate its operation on a set of sample configurations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Configuring storage-area networks using mandatory security

Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both environments the network and the storage has to be configured to ensure that the data is maintained securely and can be delivered efficiently. In this paper, we describe a model of mandatory security for SAN services th...

متن کامل

Token-Based Security Protocol for Wireless Local Area Networks

As Wireless Local Area Networks (WLANs) are rapidly deployed to expand the eld of wireless products, the provision of authentication and privacy of the information transfer will be mandatory. These functions need to take into account the inherent limitations of the WLAN medium such as the noisy wireless channel, limited bandwidth and limited computational power. In this paper, we introduce a to...

متن کامل

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

Improvement in Capacity and Efficiency of Network Storage by Configuring Hard Disk Drives on Nodes of a LAN

Storage on Network has, always, been a key feature of the success of the network design. Various methods are in practice. Two techniques are suggested in this paper. Disk Clustering and a technique to have Uniform namespace KINDFS is a distributed file storage system designed to provide cost-effective storage service utilizing idle disk space on workstation

متن کامل

A Review on Security and Challenges for Vehicular Ad Hoc Networks

Vehicular Ad-hoc Networks (VANETs) are the most prominent enabling network technology for Intelligent Transportation Systems(ITS).VANETs provides many new exciting applications and opportunities albeit transportation safety and facilitation applications are their core drivers. Security of vehicular networks remains the most significant concern in VANETs deployment – because it is mandatory to a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004