Sciweavers

64 search results - page 4 / 13
» Using a virtual machine to protect sensitive Grid resources
Sort
View
SRDS
2010
IEEE
13 years 4 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
EUROMICRO
2009
IEEE
13 years 10 months ago
Multi-layered Virtual Machines for Security Updates in Grid Environments
The use of user specific virtual machines (VMs) in Grid and Cloud computing reduces the administration overhead associated with manually installing required software for every user...
Roland Schwarzkopf, Matthias Schmidt, Niels Fallen...
DAIS
2010
13 years 7 months ago
A Reconfiguration Language for Virtualized Grid Infrastructures
The growing needs in computational power to answer to the increasing number of on-line services and the complexity of applications makes it mandatory to build corresponding hardwar...
Rémy Pottier, Marc Léger, Jean-Marc ...
CCGRID
2007
IEEE
14 years 19 days ago
Design and Implementation of a Middleware for Data Storage in Opportunistic Grids
Shared machines in opportunistic grids typically have large quantities of unused disk space. These resources could be used to store application and checkpointing data when the mac...
Raphael Y. de Camargo, Fabio Kon
CCGRID
2006
IEEE
14 years 10 days ago
A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education
Simplifying access to and usage of large scale compute resources via the Grid is of critical importance to encourage the uptake of e-Research. Security is one aspect that needs to...
J. P. Watt, Oluwafemi Ajayi, Jipu Jiang, Jos Koets...