The Group Administration Shell and the GASH Network Computing Environment
نویسنده
چکیده
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exacting maintenance of multiple databases under a single point of control. This is acceptable for a few dozen machines, but with hundreds of machines spread across several administrative groups, some mechanism is needed to share administrative control over the master administrative files. The Computer Science Division of the Applied Research Laboratories, The University of Texas at Austin (ARL:UT) has developed the Group Administration Shell (GASH) system, which gives different administrators permission to administer subsets of the laboratory NIS and DNS files. In addition to distributing administrative control in a secure fashion, GASH makes a large number of system administration tasks very simple, permitting technically untrained personnel to safely perform complex system administration tasks. The Network Computing Environment (NCE) built around GASH and standard UNIX tools such as NIS, DNS, and automounter provides a flexible and reliable way of completely abstracting the user’s environment from the physical configuration of the network.
منابع مشابه
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling
With the innovation of cloud computing industry lots of services were provided based on different deployment criteria. Nowadays everyone tries to remain connected and demand maximum utilization of resources with minimum timeand effort. Thus, making it an important challenge in cloud computing for optimum utilization of resources. To overcome this issue, many techniques have been proposed ...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملGanymede: An Extensible and Customizable Directory Management Framework
In the fall of 1994, Applied Research Laboratories, The University of Texas at Austin (ARL:UT) presented a paper [1] at LISA VIII, describing work that we had performed designing and implementing a management framework for NIS and DNS, called GASH. In the years since that paper was presented, it has become clear that the design of GASH was insufficient to meet the complex, idiosyncratic, and ra...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کامل