Sciweavers

287 search results - page 15 / 58
» A Foundation for Defining Security Requirements in Grid Comp...
Sort
View
CLUSTER
2004
IEEE
14 years 9 months ago
A Synchronous Co-Allocation Mechanism for Grid Computing Systems
Grid computing systems are emerging as a computing infrastructure that will enable the use of wide-area network computing systems for a variety of challenging applications. One of ...
Farag Azzedin, Muthucumaru Maheswaran, Neil Arnaso...
EUROMICRO
2009
IEEE
15 years 1 months ago
Multi-layered Virtual Machines for Security Updates in Grid Environments
The use of user specific virtual machines (VMs) in Grid and Cloud computing reduces the administration overhead associated with manually installing required software for every user...
Roland Schwarzkopf, Matthias Schmidt, Niels Fallen...
HPCC
2007
Springer
15 years 3 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
15 years 1 months ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
PERCOM
2006
ACM
15 years 9 months ago
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover
Many solutions for securing inter-provider handover proposed to date make use of the concept of security context transfer. However, none of these solutions addresses problems aris...
Ulrike Meyer, Susanne Wetzel