Sciweavers

391 search results - page 20 / 79
» Transparent access to Grid resources for user software
Sort
View
GCA
2009
14 years 7 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson
CONCURRENCY
2008
105views more  CONCURRENCY 2008»
14 years 9 months ago
Coordinating access control in grid services
We describe how to control the cumulative use of distributed grid resources by using coordination aware policy decision points (coordinated PDPs) and an SQL database to hold "...
David W. Chadwick, Linying Su, Romain Laborde
GRID
2000
Springer
15 years 1 months ago
MeSch - An Approach to Resource Management in a Distributed Environment
Resource management in the typical Grid environment based on multi-MPP systems or clusters today still is one of the challenging problems. We will present MeSch, a solution for the...
Gerd Quecke, Wolfgang Ziegler
EOR
2010
88views more  EOR 2010»
14 years 9 months ago
Market-based pricing in grids: On strategic manipulation and computational cost
Grid technologies and the related concepts of utility computing and cloud computing enable the dynamic sourcing of computer resources and services, thus allowing enterprises to cu...
Jochen Stößer, Dirk Neumann, Christof W...
82
Voted
GRID
2005
Springer
15 years 3 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...