33 | | We have run several experiments based on the revised experimentation plans delivered in Milestone 2. They include the experiments in three directions, namely, authentication, runtime interaction, and virtual machines. Especially, some of the experiments have followed the development of ProtoGENI, such as virtual node. We tried to install our own virtual machine and reference CM to test security breaches. We analyzed more test scripts for potential experiments. We have used the geni-user mailing-list to interact with ProtoGENI technical personals to solve several problems in our experiments. The results and findings will be reported in a separate document soon. In addition, they will be presented in GEC#8. [[BR]] |
| 35 | We have run several experiments based on the revised experimentation plans delivered in Milestone 2. They include the experiments in three directions, namely, authentication, runtime interaction, and virtual machines. Especially, some of the experiments have followed the development of ProtoGENI, such as virtual node. We tried to install our own virtual machine and reference CM to test security breaches. We analyzed more test scripts for potential experiments. We have used the geni-user mailing-list to interact with ProtoGENI technical personals to solve several problems in our experiments. The results and findings will be reported in a separate document soon. In addition, they will be presented in GEC8. [[BR]] |