The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the current scenario of grid computing, heterogeneous resources are distributed across different administrative domains and geographical boundaries. Every node in a cluster consists of multiple core CPUs wherein the distributed memory across nodes and shared memory co-exists, thereby paving way for hybrid architectures. The hybrid programming approach combines MPI and OpenMP libraries to exploit...
Grid Computing is a domain in full development. The software known as middleware is upgraded and improved. Based upon this simple words, this paper will show how the software on the site RO-14-ITIM, from the National Institute for Research and development of Isotopic and Molecular Technology improved in the last four month from the European Middleware Initiative (EMI) 1 to version 3, the difficult...
In recent years, E-learning has been in a continuous development, due to the fact that it eases the process of teaching, evaluation and selfevaluation, offering schedulling flexibility and a tool support. E-learning makes learning content available even in remote locations, eliminating the need to travel to the place where the content is delivered. Nevertheless, the current E-learning platforms have...
Grid computing provides integrated high-end compute resources across administrative domains. More and more grid infrastructures are being used for mission-critical scientific and engineering applications. Ensuring security and safety of grid environment is a key challenge faced by grid community. First step towards grid security is to be aware of vulnerabilities and weaknesses in the entire grid....
Today, many scientific disciplines heavily rely on computer systems for in-silico experimentation or data management and analysis. The employed computer hard- and software is heterogeneous and complies to different standards, interfaces and protocols for interoperation. Grid middleware systems like UNICORE 6 try to hide some of the complexity of the underlying systems by offering high-level, uniform...
Porting applications to Distributed Computing Infrastructures (DCIs) is eased by the use of workflow abstractions. Yet, estimating the impact of the execution DCI on application performance is difficult due to the heterogeneity of the resources available, middleware and operation models. This paper describes a workflow-based experimental method to acquire objective performance comparison criterions...
Grid portal is a secure web environment where user can monitor and execute grid applications, access grid resources, services, and collaborate with other users. A grid portal allows an organization to have a single URL that enables users to gain browser-based access to applications and any customized information in a virtualized, unified and secure way. The main requirement for this grid portal is...
In recent years, the research to the Grid economy has become a hot spot with the development of Grid technology. Some models and middleware have been proposed to improve the application of Grid economy. One remarkable result of these is the Grid Architecture for Computational Economy (GRACE) which contains the functionality of resource discovery, resource trade and resource allocation. However, in...
More and more E-business services of enterprises are performed by the 3rd party E-business platform, which leads to bad system performance. To solve the performance issue, an E-business architecture based on grid computing is proposed. The major architecture is depicted and discussed in detail, and some features of our proposed architecture are outlined. To verify the feasibility of E-business application...
Considering OGSA architecture, this paper introduces a new Grid Security System Based on Middleware (GSSBM). The grid includes many different domains; it can make use of middleware technology to implement grid security. Integrating the GSI and PKI technologies, the architecture can solve the single sign-on, authentication, proxy and user-based trust model.
Currently, most workflow management systems in Grid environments provide push-oriented job distribution strategies, where jobs are explicitly delegated to resources. In those scenarios the dedicated resources execute submitted jobs according to the request of a workflow engine or Grid wide scheduler. This approach has various limitations, particularly if human interactions should be integrated in...
The cloud paradigm appeared on the computing scene in 2005 with the Amazon Elastic Compute Cloud (EC2). After this date, a large set of related technologies has been developed. In the academic world, and especially in the HPC area, cloud computing is in some way in competition with the GRID model, which offers a middleware based approach. One of the solutions proposed is the integration of the two...
Service Level Agreements (SLA) are commonly used to define terms and conditions of service provisioning. WS-Agreement is an SLA specification that addresses the need of both producers and consumers of services to specify and negotiate terms and conditions of access to these services. This specification has gained wide acceptance in both the Grid computing and Web Services communities. WS-Agreement...
The COMETA e-Infrastructure running in Sicily is compliant with the EGEE middleware and specifications offering a great computing power and huge storage capacity. Since its beginning one of the main goals has been to extend the adoption of Grid paradigm from the academic to business world. Several software and hardware extensions have been implemented in order to enhance the infrastructure performances;...
The following topics are dealt with: interconnection networks; distributed processing; parallel processing; multi-core architectures; distributed systems; intelligent systems; ubiquitous systems; middleware; ubiquitous networking; wireless sensor networks; mobile ad hoc networks; security; service computing; routing; Internet; Web technology; medical document processing; intelligent medical information...
Computational grids are now mainstream facilities for e-research worldwide. While enterprise grids exist within organizations, national grids have become common, usually consisting of government as well as academic facilities. Such facilities are not uncommonly lenient with blanket policies to allow inbound and outbound grid traffic. This is far from ideal, from a security perspective, but given the...
Even though trust plays a significant role during decision-making in open collaborative environments, still end-user trust mechanisms have not be deployed in the EGEE grid computing setting. In this paper, we conduct a preliminary investigation on the integration of the trust paradigm in that environment, with a special focus on achieving end-user trust in an intuitive and practical manner.
This work presents a grid environment, based on UNICORE 6 middleware, which was used to analyze their security levels, compatibility with other middlewares and the resources available to integrate, visualize and manage different computational electromagnetic applications. The flexibility and performance of this approach is presented in two examples. Fist, a multiplatform CAD software developed in...
The Italica Project is the implementation of an electronic health record system at the Italian Hospital of Buenos Aires. The present work shows the implementation of a medical signal grid repository module and its integration to the Italica Project. We also describe the architecture of that module and explain the design decisions taken for its construction. The integration to the preexisting system...
Network security is in a daily evolving domain. Every day, new attacks, virus or intrusion techniques are released. Hence, network devices, enterprise servers or personal computers are potential targets of these attacks. Current security solutions like firewalls, intrusion detection systems (IDS) and virtual private networks (VPN) are centralized solutions which rely mostly on the analyze of inbound...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.