Configuring Storage Area Networks for Mandatory Security
نویسندگان
چکیده
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both environments the network and the storage has to be configured to ensure that the data is maintained securely and can be delivered efficiently. In this paper we describe a model of mandatory security for multi-domain storage services that is flexible enough to reflect the data requirements, tractable for the administrator, and implementable as part of an automatic configuration system. We describe the model abstractly, its implementation as part of a prototype SAN configuration system written in OPL, and illustrate its operation on a set of sample configurations.
منابع مشابه
Configuring storage-area networks using mandatory security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both environments the network and the storage has to be configured to ensure that the data is maintained securely and can be delivered efficiently. In this paper, we describe a model of mandatory security for SAN services th...
متن کاملToken-Based Security Protocol for Wireless Local Area Networks
As Wireless Local Area Networks (WLANs) are rapidly deployed to expand the eld of wireless products, the provision of authentication and privacy of the information transfer will be mandatory. These functions need to take into account the inherent limitations of the WLAN medium such as the noisy wireless channel, limited bandwidth and limited computational power. In this paper, we introduce a to...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملImprovement in Capacity and Efficiency of Network Storage by Configuring Hard Disk Drives on Nodes of a LAN
Storage on Network has, always, been a key feature of the success of the network design. Various methods are in practice. Two techniques are suggested in this paper. Disk Clustering and a technique to have Uniform namespace KINDFS is a distributed file storage system designed to provide cost-effective storage service utilizing idle disk space on workstation
متن کاملA Review on Security and Challenges for Vehicular Ad Hoc Networks
Vehicular Ad-hoc Networks (VANETs) are the most prominent enabling network technology for Intelligent Transportation Systems(ITS).VANETs provides many new exciting applications and opportunities albeit transportation safety and facilitation applications are their core drivers. Security of vehicular networks remains the most significant concern in VANETs deployment – because it is mandatory to a...
متن کامل