The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network technology like grid computing,...
Grid computing provides integrated high-end compute resources across administrative domains. More and more grid infrastructures are being used for mission-critical scientific and engineering applications. Ensuring security and safety of grid environment is a key challenge faced by grid community. First step towards grid security is to be aware of vulnerabilities and weaknesses in the entire grid....
The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as Web Services, Grid, and Cloud Computing. Since existing security mechanisms are insufficient to cover the diversity of workflow application domains, trust is considered as an adaptive, high-level abstraction, and platform-independent solution...
This paper describes an approach to the formulation and classification of security requirements in eScience. It explains why it is untenable to suggest that `one size fits all', and that what is an appropriate security solution in one context may not be at all appropriate in another. It proposes a framework for the description of eScience security in a number of different dimensions, in terms of measures...
The following topics are dealt with: mobile computing; wireless communications; database and data mining; grid and cloud computing; ubiquitous computing; intelligent and bio-inspired computing; advanced networking; security; distributed and parallel computing; data management; workflow management; quality of services and scientific computing.
Task scheduling and resource allocation are the crucial issues in any large scale distributed system, such as Computational Grids (CGs). However, traditional computational models and resolution methods cannot effectively tackle the complex nature of Grid, where the resources and users belong to many administrative domains with their own access policies, users' privileges, etc. Recently, researchers...
Modern e-Science and high technology industry require high-performance and complicated network and computer infrastructure to support distributed collaborating groups of researchers and applications that should be provisioned on-demand. The effective use and management of the dynamically provisioned services can be achieved by using the Service Delivery Framework (SDF) proposed by TeleManagement Forum...
The goal of this paper is to develop a fault tolerant Grid Intrusion Detection System. The architecture is based on a network of high level detection systems which receive intrusion information form local detectors. These high level detectors constantly exchange information using gossip algorithms and correlate the data received received from the local level to detect complex attacks targeted at different...
This paper highlights a framework for cyber surveillance of unlawful activities for critical infrastructure protection. The framework uses a computational grid based environment, which is capable of distributed data mining and real time surveillance.
Both cloud and GRID are computing paradigms for the large-scale management of distributed resources. Even if the first is usually oriented to transaction-based applications, and the latter to High Performance Computation, there is a lot of interest in their integration. This is typically obtained through the Infrastructure-as-a-Service cloud model, which is exploited in the GRID context to offer machine...
The uncertainties of grid nodes security are main hurdle to make the job scheduling secure, reliable and fault-tolerant. The fixed fault-tolerant strategy in jobs scheduling may utilize excessive resources. In this paper, the job scheduling decides which kinds of fault-tolerance strategy will be applied to each individual job for more reliable computation and shorter makespan. And we discuss the fuzziness...
The DynaSOAr framework presents a wholly service-oriented approach to grid and Internet-based computing that makes a clear and explicit separation of concerns between service-provision and resource-provision for each service invocation. The separation allows the dynamic deployment of code at runtime, in the form of a service implementation, between a service provider and an explicit resource provider...
The Scientific Bytecode Virtual Machine is a virtual machine designed specifically for performance, security, and portability of scientific applications deployed in a Grid environment. The performance overhead normally incurred by virtual machines is mitigated using native optimized scientific libraries, security is obtained by sandboxing techniques. Lastly, by executing platform-independent bytecodes,...
Although event recording on a computer system (also known as logging) is of utmost importance for reconstructing and detecting security relevant events, currently no adequate and sophisticated solution for complex environments, such as Grid and Cloud Computing, exist. Current LOG file formats lack of several important factors, hindering automatic evaluation needed for distributed systems to comply...
For the task scheduling problem in the heterogeneous grid environment, a security benefit function is constructed by considering the task scheduling demand for confidentiality, integrity and authenticity. Then, according to the history behavior of grid resource nodes, node's credibility dynamic evaluation method is proposed by using the weighted function. Based on these, a new grid task security scheduling...
Facing with the enlarging scale of Grid, the entity has to process large amounts of recommendatory trust data. The data may contain malicious recommendation, which would make the result inaccurate when using D-S theory or arithmetic average. Furthermore, the trust value of target entity would be distorted with the length of the trust chain. This paper proposes a Cloud-based processing method to solve...
Grid computing technique is a mature technique for distributed-data computing and processing. Scientific workflow (SWF) technique is one of the most important parts of grid computing and typically used for job scheduling, distributed services invocation and distributed data processing. However, rare previous literatures studied the security issues of SWF in the design of scientific workflow though...
The last few years have witnessed huge growth in computer technology and available resources throughout the Internet. These resources can be used to run CPU-intensive applications requiring long periods of processing time. Grid systems allow us to take advantage of available resources lying over a network. However, these systems impose several difficulties to their usage (e.g. heavy authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.