The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computational grids have been at the forefront of e-science supercomputing for several years now. Many issues have been settled over the years, but some may only appear to be so. One of these issues is firewall traversal. Many solutions have been proposed and developed. We have developed two such solutions ourselves: Remus and Romulus, but like all other solutions, they are limited in application...
Although event recording on a computer system (also known as logging) is of utmost importance for reconstructing and detecting security relevant events, currently no adequate and sophisticated solution for complex environments, such as Grid and Cloud Computing, exist. Current LOG file formats lack of several important factors, hindering automatic evaluation needed for distributed systems to comply...
In this paper, we tried to enable a mobile device as a resource to access to the grid network. By improved Internet technique, the use of mobile devices is rapidly increased. And some researches in grid computing tried to combine grid computing with mobile devices. However, according to properties of mobile environments, mobile devices have many considerations, such as mobility management, disconnected...
Sharing data within grid environments always results in losing control over data usage. If the shared information is medical data, this violates laws as specified in HIPAA, because access to such data must be reconstructible and needs to be tightly controlled. To comply with these regulations it must be guaranteed, that each data access and modification is recorded to produce audit trails. The provided...
Cloud computing uses virtualization technologies to offer a non-shared use rental of computer resources with publicly accessible worker nodes. However, unlike grid computing, cloud computing as implemented by Amazon, IBM, Google and Microsoft only offers compute and storage resources from a single organization. Many of the cross-site and cross-organizational advantages offered by grid computing are...
To secure communication in Grids many efforts have been made regarding authentication and authorization. Due to some application requirements it is up to now recommended to open wide port ranges on firewalls. This configuration is commonly accepted as insecure. We present an approach to enhance the security of firewalled Grid components by a new method to dynamically authorize TCP connections on firewalls...
Nowadays large scale data storage and processing can be achieved on a set of federated computers which can be interconnected over a LAN (local area network), a cluster or even a grid. Many researchers attempted to achieve this work on volunteer grids where the corresponding computers are voluntary connected or disconnected. In fact, this kind of grids presents several advantages such as the possibility...
Cloud computing allows delivering information technology power on demand. Be it either the hosting of a certain Web application or the outsourcing of an entire server or data center by means of virtualization. Applying these techniques however goes along with handing over the ultimate control of data to a third party. This paper investigates the application of Nimbus as a cloud resource and shows...
As virtual appliances become more prevalent, we encounter the need to stop manually adapting them to their deployment context each time they are deployed. We examine appliance contextualization needs and present architecture for secure, consistent, and dynamic contextualization, in particular for groups of appliances that must work together in a shared security context. This architecture allows for...
In this paper, an approach to create virtual cluster environments is presented which enables fine grained service-oriented applications to be executed side by side to traditional batch job oriented Grid applications. Secure execution environments which can be staged into an existing batch job environment are created. A grid enabled workflow engine to build complex application workflows which are executed...
IP spoofing has been exploited by distributed denial of service (DDoS) attacks to conceal flooding sources and localities in flooding traffic, and prevent legitimate hosts into becoming reflectors, redirecting and amplifying flooding traffic. Thus, the ability to filter spoofed IP packets near victims is essential to their own protection as well as to their avoidance of becoming involuntary DoS reflectors...
This poster describes current work on the application of network virtualization and peer-to-peer routing techniques that overlay IP traffic and provide seamless connectivity to virtual machines in grid computing. Such IP-over-P2P virtual network - IPOP - is an overlay network that uses a virtual IP address space and allows nodes that belong to a grid to be seamlessly pooled together. The overlay network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.