next up previous
Next: Mode of Operation Up: Runtime Environment Previous: Common Data Storage System

Security

The distributed approach we propose, requires network access to at least one of the analysis nodes serving as master communication node to the outer world. This brings up security issues. Therefore, the master analysis node should be totally shielded by a firewall allowing just the ssh protocol from a small set of machines known to be trusted clients of the analysis facilities. In addition, the server has been designed to run in user space only, and it is not desired to give potential access to data that is not owned by a client.



2003-10-06