The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Grid computing systems are complex and dynamic systems and therefore require appropriate automated management, which would enable stable and reliable operation of the whole grid environment. The research community has addressed this requirement with a number of monitoring frameworks, which serve to collect data at various levels to support decision taking and management activities within grids. However,...
Delay Tolerance Networks (DTNs) are the networks in which no end to end path is present between nodes or may partially present with limited period of time. To forward a packet, DTN uses store, carry and forward mechanism. Security is one of the key issues in DTN. There are various security threats such as message modification, packet dropped, and selfish node etc. Nodes which are the part of a DTN,...
The paper presents application of SIP protocol in the context of bag-of-tasks grid architecture. The SIP protocol has been used in realization of the execution management service. The main idea is use of stateful SIP proxy as request broker. The paper provides description of the concept, and the prototype system that has been built, as well as calculation of estimated performance level and it's relation...
Current state-of-the-art infrastructure-centric deployment and management of distributed web-scale applications cannot scale and meet the demands of changing workloads and increasing demands on application availability, mobility and security. The DIME network architecture has matured during the last four years to offer an alternative to provide a post-Hyper visor, Hyper-Cloud network of applications...
In a multi-organization environment like the GRID, each institute might want to apply some boundaries on how its resources are being utlized by other institutes. A disagreement between the multi-Virtual Organizations (VOs) might happen in the security aspect for the policy framework. Mobile Grid Services has given the ability to move jobs, data and application software from nodes to nodes during jobs...
This paper describes a simple logical method to enhance the security in the grid computing. Object Based Grid Architecture (OGA) is a grid architecture based on object oriented concept to enhance the security in grid computing. In the grid environment the data and the process will be a public one since the job is executed on the public connected system and the resources will be shared among them with...
Grid computing provides integrated high-end compute resources across administrative domains. More and more grid infrastructures are being used for mission-critical scientific and engineering applications. Ensuring security and safety of grid environment is a key challenge faced by grid community. First step towards grid security is to be aware of vulnerabilities and weaknesses in the entire grid....
Service Oriented Infrastructures including Grid and Cloud Computing are technologies in a critical transition to wider adoption by business. Their use may enable enterprises to achieve optimal IT utilization, including sharing re-sources and services across-enterprises and on-demand utilization of those made available by business partners over the network. This paper presents a selection of common...
Security problems arise in software systems are very challenging. Using program analysis techniques and some language based security rules can help in enforcing application-level security through control access to program resources and verification of control flow of the information inside the program based on some security properties. This paper presents a new job analyzer component for an intrusion...
Previous distributed anomaly detection efforts have operated on summary statistics gathered from each node. This has the advantage that the audit trail is limited in size since event sets can be succinctly represented. While this minimizes the bandwidth consumed and helps scale the detection to a large number of nodes, it limits the infrastructure's ability to identify the source of anomalies. We...
Computational grids have been at the forefront of e-science supercomputing for several years now. Many issues have been settled over the years, but some may only appear to be so. One of these issues is firewall traversal. Many solutions have been proposed and developed. We have developed two such solutions ourselves: Remus and Romulus, but like all other solutions, they are limited in application...
In recent years, the research to the Grid economy has become a hot spot with the development of Grid technology. Some models and middleware have been proposed to improve the application of Grid economy. One remarkable result of these is the Grid Architecture for Computational Economy (GRACE) which contains the functionality of resource discovery, resource trade and resource allocation. However, in...
In a virtual cluster based Cloud Computing environment, the sharing of infrastructure introduces two problems on user management: usability and security. Meanwhile, we observe that most conventional user management frameworks in the network environment are not fit for the scale expansion and interconnection of dynamic virtualization environment. In this paper, we propose VegaWarden, a uniform user...
The DynaSOAr framework presents a wholly service-oriented approach to grid and Internet-based computing that makes a clear and explicit separation of concerns between service-provision and resource-provision for each service invocation. The separation allows the dynamic deployment of code at runtime, in the form of a service implementation, between a service provider and an explicit resource provider...
The Scientific Bytecode Virtual Machine is a virtual machine designed specifically for performance, security, and portability of scientific applications deployed in a Grid environment. The performance overhead normally incurred by virtual machines is mitigated using native optimized scientific libraries, security is obtained by sandboxing techniques. Lastly, by executing platform-independent bytecodes,...
More and more E-business services of enterprises are performed by the 3rd party E-business platform, which leads to bad system performance. To solve the performance issue, an E-business architecture based on grid computing is proposed. The major architecture is depicted and discussed in detail, and some features of our proposed architecture are outlined. To verify the feasibility of E-business application...
The cloud paradigm appeared on the computing scene in 2005 with the Amazon Elastic Compute Cloud (EC2). After this date, a large set of related technologies has been developed. In the academic world, and especially in the HPC area, cloud computing is in some way in competition with the GRID model, which offers a middleware based approach. One of the solutions proposed is the integration of the two...
Desktop Grids harvest the computing power of idle desktop computers whether these are volunteer or deployed at an institution. Allowing foreign applications to run on these resources requires the sender of the application to be trusted, but trust in goodwill is never enough. An efficient solution is to provide a secure isolated execution environment ("sandbox"), which does not constrain...
We present in this paper a secure and scalable Grid-based content management system for the management of high-volume multimedia data in the domain of the publishing industry. This is achieved by leveraging on existing individual solutions, such as the Alfresco content management system, the SRM standard for building scalable solutions based on the Grid and the GridTrust services for building trustworthy...
In this paper, we tried to enable a mobile device as a resource to access to the grid network. By improved Internet technique, the use of mobile devices is rapidly increased. And some researches in grid computing tried to combine grid computing with mobile devices. However, according to properties of mobile environments, mobile devices have many considerations, such as mobility management, disconnected...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.