The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Resources sharing is the main concerns of grid computing. With an in-depth study of the grid resource management models, a five-layer grid resource management model is proposed to deal with the problems and defects of grid resource management. The hierarchy structure of the model can not only mask the diversity of grid resources, but also increase the security of sharing, thus achieving the scalability...
This paper describes an approach to the formulation and classification of security requirements in eScience. It explains why it is untenable to suggest that `one size fits all', and that what is an appropriate security solution in one context may not be at all appropriate in another. It proposes a framework for the description of eScience security in a number of different dimensions, in terms of measures...
Research teams collaborating across institutional, geographical and cultural boundaries are increasingly common. Funding agencies including the National Science Foundation (NSF) and National Institutes of Health (NIH) strongly encourage virtual organization building and collaboration across institutions and disciplines. A set of software tools that enables scientists to efficiently share information...
This paper presents the various mechanisms for virtual machine image distribution within a large batch farm and between sites that offer cloud computing services. The work is presented within the context of the Large Hadron Collider Computing Grid (LCG), it has two main goals. First it aims at presenting the CERN specific mechanisms that have been put in place to test the pre-staging of virtual machine...
DHT based routing protocols are very exciting innovative aspects in the area of P2P overlay networks; this kind of networks are appropriate and accepted especially in file sharing like transactions. The reason of the Distributed Hash Table is giving the way to search the resources (mostly files) inside the P2P network. A DHT protocol typically provides a single function to the P2P application: given...
Computational grids have been at the forefront of e-science supercomputing for several years now. Many issues have been settled over the years, but some may only appear to be so. One of these issues is firewall traversal. Many solutions have been proposed and developed. We have developed two such solutions ourselves: Remus and Romulus, but like all other solutions, they are limited in application...
The last few years have witnessed huge growth in computer technology and available resources throughout the Internet. These resources can be used to run CPU-intensive applications requiring long periods of processing time. Grid systems allow us to take advantage of available resources lying over a network. However, these systems impose several difficulties to their usage (e.g. heavy authentication...
In order to improve the dynamic and scalability of grid, the paper adopts the way fusing P2P and Grid organically, which resolves the issue that the node can join randomly and the resource-sharing can be dynamic in gird. This paper builds a resource architecture model based on P2PGrid and proposes a resource discovery algorithm fusing DHT and ant colony algorithm. This algorithm can accurately and...
Network security is in a daily evolving domain. Every day, new attacks, virus or intrusion techniques are released. Hence, network devices, enterprise servers or personal computers are potential targets of these attacks. Current security solutions like firewalls, intrusion detection systems (IDS) and virtual private networks (VPN) are centralized solutions which rely mostly on the analyze of inbound...
Grid computing, utility computing, P2P computing, service computing and cloud computing, such as technological development is leading the future of networks resources, services resources, data resources toward shared, on-demand, and the tendency of promoting utility. To develop an internationally advanced course of study on service sciences has enormous opportunities, especially in service composing,...
Grid computing has contributed to advances in computational and communication technologies, which has made economically feasible the conglomeration of multiple clusters of heterogeneous networked resources and services that, in turn, has lead to the development of large-scale distributed systems. However, available resources may be shortage. We propose a secure delivery and billing protocol between...
Grid systems provide a standard platform to share resources, such as computing facilities and backup services, between research communities and commercial organizations. Nowadays there are plenty of grids among different institutions, and many of them are probably heterogeneous to others because they are constructed by different types of middleware. Enabling all these grids to work as a single grid...
Conventional grid infrastructure implements CA to ensure security and authentication access control which is not flexible, while peer-to-peer applications are flexible enough but no evaluation system to ensure members in a virtual organization are proper and safe enough to corporate with each other. In this paper, we propose an easily extendable evaluation system using the fuzzy analytic hierarchy...
Peer-to-Peer (P2P) electronic commerce greatly enhances the convenience and flexibility of e-business, but it also aggravates the risk and security threatening business activity. In order to prevent the vulnerable peers from involving in transaction and solve the trust problem of no-history record peers, this paper proposes a new trust model of P2P e-commerce, which is based on voting agreement. It...
While grid computing promises unparalleled secure sharing of computation and resources in a heterogeneous environment, it has not yet found wide-spread adoption. Without a large user base, the promises of grid computing can not be fulfilled. One reason grid computing has lacked wide adoption because users are unwilling to suffer the cost of learning new paradigms or to modify applications to use grid...
The following topics were dealt with: security, privacy and trust; information and data management; Web and search; Web and services; P2P and grid; knowledge and machine leaning; wired and wireless networks; image and signal processing; distributed applications and performance evaluation; business applications and management; education and new technologies; pervasive computing and robotics.
"ULTRA GRIDSEC" (Mostafa et al., 2008) is a high performance symmetric key cryptography schema used to increase the performance of symmetric key encryption algorithms like DES and TDES by decreasing their execution time and increasing their security by using compression and multithreading techniques and other enhancement points. In this paper we enhancing the performance of a "ULTRA...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.