• No results found

Defining InterCloud Architecture (for Cloud based Infrastructure Services provisioned on-demand) and Cloud Security Infrastructure

N/A
N/A
Protected

Academic year: 2021

Share "Defining InterCloud Architecture (for Cloud based Infrastructure Services provisioned on-demand) and Cloud Security Infrastructure"

Copied!
37
0
0

Loading.... (view fulltext now)

Full text

(1)

Defining InterCloud Architecture

(for Cloud based Infrastructure Services provisioned

on-demand)

and

Cloud Security Infrastructure

Yuri Demchenko

SNE Group, University of Amsterdam

Cloud Federation Workshop, OGF32

16 July 2011, Salt Lake City

Cloud Federation @OGF32 -

(2)

Outline

• General use cases for InterCloud Architecture

– Provisioning Cloud based project oriented infrastructures on-demand and distributed virtualised applications mobility

• Existing standardisation and other initiatives

– IEEE InterCloud Working Group(s) – DMTF OVF and VMware vApp

• Architectural Framework of the Cloud IaaS Provisioning Model (by UvA)

• Cloud Security Infrastructure and Dynamic Security Services Provisioning

– Security Context Management

Cloud Federation @OGF32 - 16 July

(3)

SNE Cloud Research Directions

(1) Generic Cloud IaaS Architecture, Release 1, 15 April 2011

Published as http://staff.science.uva.nl/~demch/worksinprogress/sne2011-techreport-2011-03-clouds-iaas-architecture-release1.pdf

• Infrastructure Services Modeling Framework (ISMF) • Composable Services Architecture (CSA)

• Service Delivery Framework (SDF)

(2) InterCloud (OS/Middleware)

• Targeting for InterCloud BGP-like protocol

• Merging (1) and (2) under InterCloud Architecture

• Network infrastructure provisioning as part of Cloud infrastructure provisioning

(3) Security Infrastructure for Cloud (dynamically provisioned)

• Dynamic Access Control Infrastructure (DACI)

• Following Cloud standardisation and contributing to NIST Cloud

collaboration

Cloud Federation @OGF32 -

(4)

General use cases for InterCloud Architecture

• Clouds are evolving as a common way of provisioning

infrastructure services on-demand

– In this way, Clouds add a new type of services in addition and on the

top of currently existing network based and distributed services

– Using real life analogy “like moving house”

• InterCloud Architecture (ICA) provide a framework to support

provisioning Cloud based project oriented infrastructures

on-demand and distributed virtualised applications mobility

– Hybrid Cloud/Grid e-Science collaborative environment

– Educational Lab deployment in Clouds

• Other use cases to be defined

Cloud Federation @OGF32 -

(5)

Use case 1: Cloud based e-Science infrastructure

InterCloud Architecture and Security 5

Control & Monitoring Sc. Instrument (Manufactrg) Grid Storage T1 Grid CE Data Filtering Grid Storage T0 Grid VO-A Visuali- sation User Group A User CE Campus A Visuali- sation User CE User Group B Campus B CE CE CE SE SE CSE CSE CSE CSE CloudSE T1 CE Processed Data Experimental Data Specialist Data Processing Project based Cloud Infrastructure Data Filtering Ctrl&Mngnt Plane

Project based Collaborating user groups located in remote campuses on data intensive

projects requiring high performance computing and rich visualisation

Grid based core eScience Infrastructure including data intensive scientific instrument Campus infrastructure including visualisation tools Cloud infrastructure provisioned on demand

Cloud Federation @OGF32 - 16 July 2011, Salt Lake City

(6)

Use case 2: Educational Lab (mobility)

• Educational lab is created for a specific course in one

university

– A course is computing intensive and has periodicity of one semester

• The required infrastructure is expensive and is deployed on Cloud (generally multiple)

– First installation requires significant efforts that need to preserved

• Between periodic course runs the Lab will be dormant or

should be suspended and resumed for the next term

– Used/required Cloud resources may change/evolve

• The Lab may need to be moved to another university with

different campus network installation and available Cloud

providers

– Requires Cloud services standardisation and interoperability

Cloud Federation @OGF32 -

(7)

InterCloud: Related standardisation activity

• IEEE - WGs on InterCloud issues and Cloud Profiles

– IEEE ICWG/2302 WG - Intercloud WG (ICWG) Working Group

http://standards.ieee.org/develop/wg/ICWG-2302_WG.html

– CPWG/2301 WG - Cloud Profiles WG (CPWG) Working Group

http://standards.ieee.org/develop/wg/CPWG-2301_WG.html

• DMTF OVF (

http://www.dmtf.org/standards/ovf

)

– Supported by VMware OVF Tool 2.0

• VMware vApp

http://labs.vmware.com/flings/vapprun

Cloud Federation @OGF32 -

(8)

vApp by VMware

• vApp container for distributed multi-VM solution

– Decouples application from the deployment platform

– Built on top of OVF2.0

– Implemented as a vApprun package

http://labs.vmware.com/flings/vapprun

• Concept of a vService dependency is used to decouple a

vApp from infrastructure services and to support mobility

between cloud providers

vApp: a standards-based container for cloud providers, by R.Schmidt, S.Grarup

http://portal.acm.org/citation.cfm?id=1899943

Cloud Federation @OGF32 -

(9)

Defining InterCloud Architecture

• The prospective InterCloud Architecture should allow

interoperability and integration of existing models and Cloud

providers frameworks

– Should be supersede to Cloud Federation

• Be compatible and provide multi-layer integration of existing

Cloud service models – IaaS, PaaS, SaaS and Apps clouds

• Presumably following the same architecture patterns as

Internet and Grid/OGSA

– Provide functionalities for creating VO based infrastructures

Cloud Federation @OGF32 -

(10)

Current relation between Cloud services models

• Cloud service

models IaaS, PaaS, SaaS use

proprietary Physical Platform and

Resources

Adaptation Layer

Cloud Federation @OGF32 -

16 July 2011, Salt Lake City InterCloud Architecture and Security 10

Cloud SaaS (Apps)

Cloud PaaS (OS, mw)

Cloud IaaS (VM MgntS)

API (Data, C&MP)

API (Data, C&MP)

Customers & Applications

Physical Platform and Resources Adaptation Layer (PPR Adaptation) User and Application API (Data, C&MP)

Computer Platform

PPR Adaptation PPR Adaptation

(11)

Computer Platform

Prospective InterCloud Architecture

• Standardisation API’s between different Cloud service models • Cloud/ICA layered API

– For application data communication – For Control and

Management

Cloud Federation @OGF32 -

16 July 2011, Salt Lake City InterCloud Architecture and Security 11

Cloud SaaS (Apps)

Cloud PaaS (OS, mw)

Cloud IaaS (VM MgntS)

API (Data, C&MP)

API (Data, C&MP)

Customers & Applications

Physical Platform and Resources Adaptation Layer User and Application API (Data, C&MP)

(12)

Defining InterCloud

Architecture API’s

• InterCloud Architecture (ICA) should address interoperability

of different Cloud service platforms and multi-cloud

integration, including with legacy campus infrastructure

• Define InterCloud protocols and API’s stack

– VI-API – IaaS API

– P-API – PaaS API

– SA-API – Software (and applications) API

OCCI can be a base for defining most of APIs

• Depending on service model, some API’s may be run by

providers and some by customers/users

Cloud Federation @OGF32 -

(13)

Architectural Framework for Cloud IaaS

Published as SNE Technical Report

http://staff.science.uva.nl/~demch/worksinprogress/sne2011-techreport-2011-03-clouds-iaas-architecture-release1.pdf

• Includes the following main components

– Infrastructure Services Modeling Framework (ISMF)

– Composable Services Architecture (CSA)

– Service Delivery Framework (SDF)

• Additional components (orthogonal)

– Cloud Security Infrastructure

– Control and Management Plane

Cloud Federation @OGF32 -

(14)

Use case 1: Cloud based e-Science infrastructure

InterCloud Architecture and Security 14

Control & Monitoring Sc. Instrument (Manufactrg) Grid Storage T1 Grid CE Data Filtering Grid Storage T0 Grid VO-A Visuali- sation User Group A User CE Campus A Visuali- sation User CE User Group B Campus B CE CE CE SE SE CSE CSE CSE CSE CloudSE T1 CE Processed Data Experimental Data Specialist Data Processing Project based Cloud Infrastructure Data Filtering Ctrl&Mngnt Plane

Project based Collaborating user groups located in remote campuses on data intensive

projects requiring high performance computing and rich visualisation

Grid based core eScience Infrastructure including data intensive scientific instrument Campus infrastructure including visualisation tools Cloud infrastructure provisioned on demand

Cloud Federation @OGF32 - 16 July 2011, Salt Lake City

(15)

Abstract Use Case - IaaS General Model

Cloud Federation @OGF32 -

16 July 2011, Salt Lake City InterCloud Architecture and Security 15

User/ Applic B User/ Applic A VRI2 VRI4 VRI5 VRI6 VRI2 VRI1 VI Operator Layer

PIP1 PIP2 PIP3 PIP4

Virtual Infrastructure (VI) (operated by VIO1)

VIProvider2 ND-PIP1 ND-VIP1 ND-PIP2 ND-PIP3-PIP4 ND-VIP2 ND-VIO1 UserND-A UserND-B PI Provider Layer VI Provider Layer VIProvider1

VI/VR Adaptation Layer

Pi/PR Adaptation Layer

Pi/PR Layer C om pos it io n Logic al R s r AAI/Policy Security SLC Metadada Application/Service Layer C trl & M ngnt (Orc hes trat n )

Logical Abstraction Layer

Security Context Resource

Config

VI Comp & Mngnt Layer (VICM)

VR1 VR2 VR3 VR4 VR5 VR6

VIO1

SLA/ SLM

(16)

Proposed Architectural Framework for Cloud IaaS

The proposed framework should support on-demand infrastructure services

provisioning and operation

Composable Services Architecture (CSA) that intends to provide a conceptual

and methodological framework for developing dynamically configurable virtualised infrastructure services

Service Delivery Framework (SDF) that provides a basis for defining the whole

composable services life cycle management and supporting infrastructure services

Infrastructure Services Modeling Framework (ISMF) that provides a basis for

the infrastructure resources virtualisation and management, including description, discovery, modeling, composition and monitoring

• (Additionally) Service Control and Management Plane/Framework may be

defined as combination of management functionality in all 3 components

• (Additionally) Security services/infrastructure have a dual role:

– Virtual Security Infrastructure - provisioned as a part of virtualised infrastructure – Support normal/secure operation of the whole provisioning framework

Cloud Federation @OGF32 -

(17)

Virtual Infrastructure Composition and Management

(VICM) Layer Operation

• Main actors involved into provisioning process

– Physical Infrastructure Provider (PIP) – Virtual Infrastructure Provider (VIP) – Virtual Infrastructure Operator (VIO)

• Virtual Infrastructure Composition and Management (VICM) layer

includes

– VICM middleware - defined as CSA

– Logical Abstraction Layer and the VI/VR Adaptation Layer facing correspondingly lower PIP and upper Application layer.

• The infrastructure provisioning process is defined by the Service Delivery

Framework (SDF)

• VICM redefines Logical Infrastructure Composition Layer (LICL)

proposed by GEYSERS project

– Basic functionality is implemented as GEMBus/CSA

Cloud Federation @OGF32 -

(18)

ISMF – Virtual Resource Lifecycle

Cloud Federation @OGF32 -

16 July 2011, Salt Lake City InterCloud Architecture and Security 18

{LR0} -> LR2 Planning Composition Reservation LR2 -> VR VI Deployment Ph y sica l Re sou rce Lo gi cal Re sou rce Virtua l Re sou rce Network Segment Network Segment LR0 Re-usable (Published) PRs Topology Pool Network Segment PR-LR1 Config& Instantiation Registered PRs Composed LRs Deployed VRs . Virtua l Infrastructure PIP1 PIP2

(19)

ISMF - Relation between PR-LR-VR-VI

• Virtual Resource lifecycle – defines relations between different resource

presentations along the provisioning process

• Physical Resource information is published by PIP to the Registry service serving

VICM and VIP

– Logical Resource representing PR includes also properties that define possible (topological) operations on the PR, such as e.g. partitioning or aggregation.

• Published LR information presented in the commonly adopted form (using

common data or semantic model) is then used by VICM/VIP composition service to create requested infrastructure as combination of (instantiated) Virtual

Resources and interconnecting them with the available network infrastructure

• Network infrastructure can be composed of a few network segments (from the

network topology pool) run by different network providers.

• Composed LRs are deployed as VRI/VI to VIP/VIO and as virtualised/instantiated

PR-LR to PIP

• Resource/service description format considered

– NDL/NML (Network Description Language / Network Markup Language at OGF) – Compatibility with VXDL infrastructure service request format by INRIA

Cloud Federation @OGF32 -

(20)

Composable Services Architecture (CSA)

• Defined as middleware for on-demand provisioned

Composable Services

• Proposed in the GEANT3 JRA3 Composable Services

project

• Implemented as GEMBus (GEANT Multidomain Bus)

Cloud Federation @OGF32 -

(21)

Composable Services Architecture – Version 0.13

Cloud Federation @OGF32 - 16 July

2011, Salt Lake City InterCloud Architecture and Security Slide_21

Applications and User Terminals

Composition Layer/Serv (Reservation SLA

Negotiatn)

Logical Abstraction Layer for

Component Services and Resources Control & Management Plane (Operation, Orchestration) Composable Services Middleware (GEMBus) Network Infrastructure Compute Resources Storage Resources

Component Services & Resources

Proxy (adaptors/containers) - Component Services and Resources Proxy (adaptors/containers) – Composed/Virtualised Services and Resources

MD SLC Registry Logging Security

User Client Composable Services lifecycle/provisioning stages (1) Request (2) Composition/ Reservation (3) Deployment (4) Operation (5) Decommissioning Control/ Mngnt Links Data Links

(22)

Composable Services Lifecycle/Provisioning

Workflow

• Main stages/phases

– Service Request (including SLA negotiation)

– Composition/Reservation (aka design)

– Deployment, including

Reqistration/Synchronisation

– Operation (including Monitoring and SLA enforcement)

– Decommissioning (including Dynamic Security Associations destroying/recycling)

• Additional stages

– Re-Composition should address incremental infrastructure changes – Recovery/Migration can use SL-MD

to initiate resources

synchronisation but may require re-composition

• The whole workflow is supported by the Service Lifecycle Metadata Service (SL MD)

• Provisioning session provides a framework for services context and security context management

Cloud Federation @OGF32 - 16 July

2011, Salt Lake City InterCloud Architecture and Security Slide_22

Service Request/ (SLA Negotiation) Composition/ Reservation (SLA enforcement) Deployment Operation (Monitoring) (SLA enforcement) Decommissioning (Security Recycling) Registr&Synchro (Security Bootstrap) Recovery/ Migration Re-Compo- sition Service Lifecycle Metadata Service (SL MD) Provisiong Session Managnt

(23)

Part 2: Cloud Security Infrastructure

• Provides a framework for dynamically provisioned

Cloud security services and infrastructure

Cloud Federation @OGF32 -

(24)

Cloud Security – Issues and problem environment

• Virtualised services

• On-demand/dynamic provisioning

• Multi-tenant/multi-user

• Multi-domain

• Uncontrolled execution and data storage environment

– Data protection

• Trusted Computing Platform Architecture (TCPA) • Promising homomorphic/elastic encryption

• Bootstrapping virtualised security infrastructure and virtualisation

platform

• Integration with legacy security services/infrastructure of the

providers

• Integration with the providers business workflow

Cloud Federation @OGF32 -

(25)

Current Cloud Security Model

• SLA based security model

– SLA between provider and user defines the provider responsibility and guarantees

• Actually no provider responsibility

– Providers undergo certification – Standard business model

• Using VPN and SSH keys generated for user infrastructure/VMs

– Works for single Cloud provider

• Has inherited key management problems

• Not scalable

• Not easy integration with legacy physical resources

• Simple access control, however can be installed by user

• Trade-off between simplicity and manageability

Cloud Federation @OGF32 -

(26)

New Relations in Cloud services provisioning

• Old model: Provider – User

• New relations with infrastructure services provisioning

– Provider – Customer (University) – User (End user - Student)

– Provider – Operator/Broker - Customer – User

• Rich (flexible and complex) ownership relations

• Two research projects are underway

– Trust management in Cloud based infrastructure services

provisioning

• RORA model – Resource – Ownership – Roles - Actors

– Virtual Infrastructure bootstrapping protocol

Cloud Federation @OGF32 -

(27)

Dynamically Provisioned Access Control

Infrastructure (DACI) for IaaS

Cloud Federation @OGF32 -

16 July 2011, Salt Lake City InterCloud Architecture and Security 27

User/ Applic B (TA0.B) User/ Applic A (TA0.A) VIR3 VIR4 VIR5 VIR6 VIR2 VIR1 VI Operator Layer TA1.x PIP1(TA3.1)

Virtual Infrastructure (VI) (operated by VIO1)

TD-PIP1 TD-VIP1 TD-PIP2 FedTD-PIP3-PIP4 TD-VIP2 TD/DSA VIO1 User B Trust Domain PI Provider (PR) Layer TA3.x VI Provider (VR/LR) Layer TA2.x

VI/VR Adaptation Layer

Pi/PR Adaptation Layer

Pi/PR Layer Com p o sition L o g ical Rsr AAI/Policy Security SLC Metadada Application/Service Layer Ctrl & M n g n t (Orch e strat n )

Logical Abstraction Layer

Security Context Resource

Config

VI Comp & Mngnt Layer (VICM)

VR1 VR2 VR3 VR4 VR5 VR6

VIO1 (TA1, DSA)

SLA/ SLM

PIP1(TA3.2) PIP1(TA3.3) PIP1(TA3.4)

User B Trust Domain

DSA

Legend

- DSA Security Context/ Configuration

TD* - Trust Domains

DSA – Dynamic Security Assoc. VIR* - VI Resource (deployed) VR/LR/PR – Virtual/Logical/ Physical Resource

VIProvider1 (TA2.1) VIProvider2 (TA2.2)

(28)

Cloud Federation @OGF32 - 16 July

2011, Salt Lake City InterCloud Architecture and Security Slide_28

Security Services Lifecycle Management Model

Specific SSLM stages and mechanisms to ensure consistency of the security context management

Security Service Request that initiates creation of the dynamic security association and may use SLA security context.

Reservation Session Binding with GRI (also a part of general SDF/SLM) that provides support for complex reservation process including required access control and policy enforcement.

Registration&Synchronisation stage (as part Deployment stage) that allows binding the local resource or hosting platform run-time process ID to the GRI as a provisioning session ID. Specifically targets possible scenarios with the provisioned services migration or

restoration. Service Request (GRI) Planning Design Reservation

Deployment Operation Monitoring Decom- missioning

Operation Monitoring Decommis Key Recycle Resrv Session Binding SecServ Request Deploy and Register Bootstrp Runtime Synchron B) Service Lifecycle

(29)

Security Context Management in VI/IaaS

Cloud Federation @OGF32 -

16 July 2011, Salt Lake City InterCloud Architecture and Security 29

VIO VIP VIP DACI/AAI

VI reservation request (including VIO TA1)

AuthZ request (VI-GRI)

PIP(s)

Mapping from the returned PR-LRI to VR-GRI for VIP

Reserve complex resource at PIP(s) in daisy-chain mode or concurrent mode VR reservation request

(including VIP TA2)

Reservation confirmation with PR-LRI of committed PR

VI reservation response with a VI-GRI and set of VR-GRI(s)

Generate a VI-GRI

PIP AAI

AuthZ request (PR-LRI)

User/Applicatn

VI/VR Request (TA0) SLA Negotiation

SDF Stages

VR’s . PR’s

DACI

Deployment stage – VI/VR Configuration, DACI configuration and Security context distribution

Operation stage – VI/VR Management, Monitoring, DACI operation and security context management

Dec``ommissioning stage – VI/VR teardown, resources release, security context recycling

SLA Negotiation Planning, Reservation Deployment, Activation Operation Decommissioning Generate GRI Return GRI

(30)

Additional Information

• GEYSERS project AAI

• Using AuthZ tickets and tokens for access control

and signaling

Cloud Federation @OGF32 - 16 July

(31)

AAI in GEYSERS (1)

Authentication and Authorization Infrastructure (AAI) functionalities

• Access control: interfaces, VI provisioning service

– Authentication – standard implementation – Authorization – primary focus

– Identity management – to support multi-domain attributes management

• Security context management for VI provisioning service

– Cross-layer/multi-layer

– Inter-domain/dynamic security associations

– Lifecycle and provisioning session security context

• Dynamic access control services/infrastructure

– Security Services Lifecycle Management (SSLM)

– Dynamic security/trust associations management

.

Cloud Federation @OGF32 -

(32)

AAI in GEYSERS (2)

Basic CSSI services

• Data encryption

• Digital signature

• Authentication

• Authorization

• Policy management

• Security session and

context management

CSSI – Common Security Services Interface SML NCP LICL VITM NIPS Server CCI NIPS-UNI SLI NLI PHY LPI GEYSE RS Securi ty (AAI) CSSI

Cloud Federation @OGF32 -

(33)

AAI in GEYSERS (3)

Multi-domain and Multi-layer Environment

SML NCP Upper-LICL PHY1 Lower-LICL PHY2 Lower-LICL AuthN Service TVS AuthN Service TV S AuthN Service TVS AuthZ Svc AuthZ Service AuthN Service TV S AuthZ Service AuthN Service TVS AuthZ Svc PIP Security domains VIP/VIOSecurity domain

Must provide AuthN assertion and support GRI and VI SecCtx

Cloud Federation @OGF32 -

(34)

Access Token and Pilot Token Types

AType 0 – Simple access token (refers to the reserved resources context)

AType 1 – Access token containing Obligations collected from previous domains

PType 0 – Container for GRI only

PType 1 – Container for communicating the GRI during the reservation stage

– Contains the mandatory SessionId=GRI attribute and an optional Condition element

PType 2 – Origin/requestor authenticating token

– TokenValue element contains a value that can be used as the authentication value for the token origin

– TokenValue may be calculated of the (GRI, IssuerId, TokenId) by applying e.g. HMAC function with the requestor’s symmetric or private key.

PType 3 – Extends Type 2 with the Domains element that allows collecting

domains security context information when passing multiple domains during the reservation process

– Domains’ context may include the previous token and the domain’s trust anchor or public key

PType 4 – Used at the deployment stage and can communicate between

domains security context information about all participating in the provisioned lightpath or network infrastructure resources

– Can be used for programming/setting up a TVS infrastructure for consistent access control tokens processing at the resource access stage

Cloud Federation @OGF32 -

(35)

InterCloud Architecture and Security Slide_35

General XML Token Format – Access Token and Pilot

Token

Required functionality to support

multidomain provisioning scenarios

 Allows easy mapping to SAML and XACML related elements

Allows multiple Attributes format (semantics, namespaces)

Establish and maintain Trust relations between domains

 Including Delegation

Ensure Integrity of the AuthZ decision

 Keeps AuthN/AuthZ context

 Allow Obligated Decisions (e.g. XACML)

Cloud Federation @OGF32 - 16 July 2011, Salt Lake City

(36)

InterCloud Architecture and Security Slide_36

XML Token Example – Access Token Type 0

<AAA:AuthzToken xmlns:AAA="http://www.aaauthreach.org/ns/#AAA" Issuer="urn:aaa:gaaapi:token:TVS" type=“access-type0" SessionId="a9bcf23e70dc0a0cd992bd24e37404c9e1709afb" TokenId="d1384ab54bd464d95549ee65cb172eb7"> <AAA:TokenValue>ebd93120d4337bc3b959b2053e25ca5271a1c17e</AAA:TokenValue > <AAA:Conditions NotBefore="2007-08-12T16:00:29.593Z" NotOnOrAfter="2007-08-13T16:00:29.593Z"/> </AAA:AuthzToken> • where

SessionId = GRI (Global Reservation Id)

TokenId – unique identifier (serving for logging and accountability)

TokenValue – generated securely from (GRI, TokenId, DomainId, TokenKey), or AuthzTicket (digital SignatureValue)

– The element <TokenValue> and attributes SessionId and TokenId are mandatory, and the element <Conditions> and attributes Issuer, NotBefore, NotOnOrAfter are optional – Binary token contains just two values – TokenValue and GRI

Cloud Federation @OGF32 - 16 July 2011, Salt Lake City

(37)

InterCloud Architecture and Security Slide_37

Chaining Pilot Tokens in multidomain/multiprovider

signalling

• Pilot Token type 3 Domain1 “viola” Resource Requestor Domain2

“uva” Domain3 “uclp”

<AAA:AuthzToken xmlns:AAA="http://www.aaauthreach.org/ns/AAA"

Issuer=http://testbed.ist-phosphorus.eu/uva/AAA/TVS/tokenpilot

SessionId="740b241e711ece3b128c97f990c282adcbf476bb"

TokenId="dc58b505f9690692f7a6312912d0fb4c" type="pilot-type3"> <AAA:TokenValue>190a3c1554a500e912ea75a367c822c09eceaa2f </AAA:TokenValue>

<AAA:Conditions NotBefore="2009-01-30T08:57:40.462Z" NotOnOrAfter="2009-01-30T09:21:40.462Z"/> <AAA:DomainsContext>

<AAA:Domain domainId="http://testbed.ist-phosphorus.eu/viola">

<AAA:AuthzToken Issuer="http://testbed.ist-phosphorus.eu/viola/aaa/TVS/token-pilot«

SessionId="2515ab7803a86397f3d60c670d199010aa96cb51" TokenId="c44a2f5f70346fdc2a2244fecbcdd244"> <AAA:TokenValue>dee1c29719b9098b361cab4cfcd086700ca2f414 </AAA:TokenValue> <AAA:Conditions NotBefore="2009-01-30T07:57:35.227Z" NotOnOrAfter="2009-01-31T07:57:35.227Z"/> </AAA:AuthzToken>

<AAA:KeyInfo> http://testbed.ist-phosphorus.eu/viola/_public_key_ </AAA:KeyInfo> </AAA:Domain>

</AAA:DomainsContext> </AAA:AuthzToken>

Cloud Federation @OGF32 - 16 July 2011, Salt Lake City

References

Related documents

Environmental factors were not considered when the quality coefficient was calculated in the previous section, and this weakens the measure as a determinant of its efficacy within the

This algorithm has one parameter, the stack size. Decreasing it usually reduces the accuracy of the.. the recognition performance), while a greater stack size leads to increased

Paint and Pixels Accelerate and enhance Visual Problem Solving – Integration Creates a New Art

Primary data is data obtained through interviews with head of village on current practice of rural administration in Johor regarding on issues and challenges and also

A roll call vote was taken with the following tabulation: Commissioner DeHart – aye, Commissioner Paul – aye, Commissioner Davies – aye, Vice President Truntz – aye, President

The dependent variables are: reasons why bullies and victims justify their implication in cyberbullying (no cyberbullying/no cybervictimization, fun, provocation,

Among these are the following: making the linguistic and cultural experience a central component in teacher training; fostering the role of university students as true