| 101 | |
| 102 | == An Example == |
| 103 | |
| 104 | === Scenario === |
| 105 | |
| 106 | Consider the ACM using GENI to run a contest like the University of [http://ictf.cs.ucsb.edu/ Santa Barbara International Capture the Flag Contest] on a larger scale. The plan is for security experts from several universities to configure a large network of machines as a playground for intrusion testers. A slice will be created containing many (virtual) machines that will be configured with a variety of known shortcomings. Signed data is hidden in various places on the machines. Then players from many universities - in fact many players from across the country - are granted access to the slice and a scavenger hunt ensues. The team that most completely audits the security of the network, by capturning the most sensitive data, wins. There may be other scoring. |
| 107 | |
| 108 | There are two classes of princpals that will be requesting access to GENI resources for this contest. There will be a comparatively small number of officials that will need allocation and configuration rights to the slice in order to set up and administer the game. There will also be the thousands or more contestants who will need access to the slice, but not configuration rights. Because of the large number of contestants, the ACM does not want to be directly in charge of vetting each one. Individual universities (and perhaps other sites) will be able to decide on the criteria to admit players from their institutions independently. Should anything go amiss - or any kind of cheating be detected - officials will want to know where the contestent came from and how they were admitted. |
| 109 | |
| 110 | For the purposes of the example, we assume that there is a GENI principal that has allocated an empty slice for the contest. That slice will be expanded and configured by principals with the GENI.adminCTF attribute and accessible by players with the GENI.accessCTF attribute. We now lay out the attribute policies for allocating these two attributes. |
| 111 | |
| 112 | Because the set of officials is small, the ACM chooses to administer them directly. To support this the GENI principal delegates the adminCTF attribute to the ACM principal: |
| 113 | |
| 114 | [[Image(example1.png)]] |
| 115 | |
| 116 | And the ACM principal authorizes principals by making them officials. |
| 117 | |
| 118 | [[Image(example2.png)]] |