SlideShare a Scribd company logo
Job
Opportunities
WHOSINIT
The WHOSINIT database provides access by group membership and individual user to all web server
resources.
Access control is on a case-by-case basis.
Next Generation Internal Security Capabilities
Server protected by
user/password using the 128 bit
session key encryption and
1024 bit RSA public key.
Files containing sensitive
information are stored within the
area controlled by the WWW
server.
All data/information files are
only accessible through
customized cgi programs, which
in turn allow the server to pass
the information only to the users
that hae access.
Access for individual cases can
be defined down to individual
Users or Groups, giving total
control over who can access a
file.
Access control method handles
very large case and user
populations. (500K cases &
1,000's of users).
Page 1 of 3WHOSINIT
12/27/2005http://www.lit.net/whosinit.html
Easy Administration of User/Group/Case Access
Graphical Interface for all internal security administration using WHOSINIT (Web Hierarchical
Operational Security:
Internal Interface).
Allows additional User Information to be maintained and used in custom cgi applications.
Secure remote server administration.
Realtime update of user access charts and group hierarchy displays.
Users or groups can be added and deleted within groups or cases through the click of a button.
Page 2 of 3WHOSINIT
12/27/2005http://www.lit.net/whosinit.html
Back to Top
Software & Hardware
The WHOSINIT software is available as part of the Data Miner/Image Archive web server for Sun/Solaris
platforms.
This project was sponsored by the ONDCP Counterdrug Technology Assessment Center.
Page 3 of 3WHOSINIT
12/27/2005http://www.lit.net/whosinit.html

More Related Content

Similar to whosinithtml

Whosinit by Sage Jackson
Whosinit by Sage JacksonWhosinit by Sage Jackson
Whosinit by Sage JacksonShane Bruce
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesSahithi Naraparaju
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...
IJECEIAES
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Isuru Vincent
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
FortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptxFortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptx
NuttapolMix
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
Rachel Phillips
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
gaurav jain
 
UserGate Proxy & Firewall
UserGate Proxy & FirewallUserGate Proxy & Firewall
UserGate Proxy & Firewall
entensys
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
IGEEKS TECHNOLOGIES
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29
rosu555
 
Encryption Alone Isn't Enough - Next Gen Digital Security Revealed
Encryption Alone Isn't Enough - Next Gen Digital Security RevealedEncryption Alone Isn't Enough - Next Gen Digital Security Revealed
Encryption Alone Isn't Enough - Next Gen Digital Security Revealed
Andrew J. Polcha
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
Hitachi ID Systems, Inc.
 
20100420 ethosdata brochure
20100420 ethosdata brochure20100420 ethosdata brochure
20100420 ethosdata brochureEthosData
 
201002 vdr-brochure-international
201002 vdr-brochure-international201002 vdr-brochure-international
201002 vdr-brochure-internationalEthosData
 

Similar to whosinithtml (20)

Whosinit by Sage Jackson
Whosinit by Sage JacksonWhosinit by Sage Jackson
Whosinit by Sage Jackson
 
Firewalls
FirewallsFirewalls
Firewalls
 
Forti os ngfw
Forti os ngfwForti os ngfw
Forti os ngfw
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
FortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptxFortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptx
 
VISULOX-Summary-SN
VISULOX-Summary-SNVISULOX-Summary-SN
VISULOX-Summary-SN
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
UserGate Proxy & Firewall
UserGate Proxy & FirewallUserGate Proxy & Firewall
UserGate Proxy & Firewall
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29
 
Encryption Alone Isn't Enough - Next Gen Digital Security Revealed
Encryption Alone Isn't Enough - Next Gen Digital Security RevealedEncryption Alone Isn't Enough - Next Gen Digital Security Revealed
Encryption Alone Isn't Enough - Next Gen Digital Security Revealed
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
20100420 ethosdata brochure
20100420 ethosdata brochure20100420 ethosdata brochure
20100420 ethosdata brochure
 
201002 vdr-brochure-international
201002 vdr-brochure-international201002 vdr-brochure-international
201002 vdr-brochure-international
 
PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 

More from Shane Bruce

Shane Bruce Resume Oct 2016
Shane Bruce Resume Oct 2016Shane Bruce Resume Oct 2016
Shane Bruce Resume Oct 2016Shane Bruce
 
Whitbeck to SNAME reference letter
Whitbeck to SNAME reference letterWhitbeck to SNAME reference letter
Whitbeck to SNAME reference letterShane Bruce
 
Transport Factors -SMb (extra) [253811]
Transport Factors -SMb (extra) [253811]Transport Factors -SMb (extra) [253811]
Transport Factors -SMb (extra) [253811]Shane Bruce
 
PROPOSAL Use of the Internet.DOC
PROPOSAL Use of the Internet.DOCPROPOSAL Use of the Internet.DOC
PROPOSAL Use of the Internet.DOCShane Bruce
 
yount's reference
yount's referenceyount's reference
yount's referenceShane Bruce
 
yount's reference
yount's referenceyount's reference
yount's referenceShane Bruce
 

More from Shane Bruce (9)

Shane Bruce Resume Oct 2016
Shane Bruce Resume Oct 2016Shane Bruce Resume Oct 2016
Shane Bruce Resume Oct 2016
 
gravitopgraphy
gravitopgraphygravitopgraphy
gravitopgraphy
 
Whitbeck to SNAME reference letter
Whitbeck to SNAME reference letterWhitbeck to SNAME reference letter
Whitbeck to SNAME reference letter
 
Transport Factors -SMb (extra) [253811]
Transport Factors -SMb (extra) [253811]Transport Factors -SMb (extra) [253811]
Transport Factors -SMb (extra) [253811]
 
CIGNSN.DOC
CIGNSN.DOCCIGNSN.DOC
CIGNSN.DOC
 
CIGCOMM.DOC
CIGCOMM.DOCCIGCOMM.DOC
CIGCOMM.DOC
 
PROPOSAL Use of the Internet.DOC
PROPOSAL Use of the Internet.DOCPROPOSAL Use of the Internet.DOC
PROPOSAL Use of the Internet.DOC
 
yount's reference
yount's referenceyount's reference
yount's reference
 
yount's reference
yount's referenceyount's reference
yount's reference
 

whosinithtml

  • 1. Job Opportunities WHOSINIT The WHOSINIT database provides access by group membership and individual user to all web server resources. Access control is on a case-by-case basis. Next Generation Internal Security Capabilities Server protected by user/password using the 128 bit session key encryption and 1024 bit RSA public key. Files containing sensitive information are stored within the area controlled by the WWW server. All data/information files are only accessible through customized cgi programs, which in turn allow the server to pass the information only to the users that hae access. Access for individual cases can be defined down to individual Users or Groups, giving total control over who can access a file. Access control method handles very large case and user populations. (500K cases & 1,000's of users). Page 1 of 3WHOSINIT 12/27/2005http://www.lit.net/whosinit.html
  • 2. Easy Administration of User/Group/Case Access Graphical Interface for all internal security administration using WHOSINIT (Web Hierarchical Operational Security: Internal Interface). Allows additional User Information to be maintained and used in custom cgi applications. Secure remote server administration. Realtime update of user access charts and group hierarchy displays. Users or groups can be added and deleted within groups or cases through the click of a button. Page 2 of 3WHOSINIT 12/27/2005http://www.lit.net/whosinit.html
  • 3. Back to Top Software & Hardware The WHOSINIT software is available as part of the Data Miner/Image Archive web server for Sun/Solaris platforms. This project was sponsored by the ONDCP Counterdrug Technology Assessment Center. Page 3 of 3WHOSINIT 12/27/2005http://www.lit.net/whosinit.html