Academic literature on the topic 'Security of grid computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security of grid computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security of grid computing"
Mishra, Neha, Ritu Yadav, and Saurabh Maheshwari. "Security Issues in Grid Computing." International Journal on Computational Science & Applications 4, no. 1 (2014): 179–87. http://dx.doi.org/10.5121/ijcsa.2014.4118.
Full textChakrabarti, Anirban, Anish Damodaran, and Shubhashis Sengupta. "Grid Computing Security: A Taxonomy." IEEE Security & Privacy Magazine 6, no. 1 (2008): 44–51. http://dx.doi.org/10.1109/msp.2008.12.
Full textDamoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam, and Brighter Agyeman. "Improving Security Measures on Grid Computing." International Journal of Computer Applications 83, no. 9 (2013): 6–11. http://dx.doi.org/10.5120/14474-2490.
Full textButt, Ali Raza, Sumalatha Adabala, Nirav H. Kapadia, Renato J. Figueiredo, and José A. B. Fortes. "Grid-computing portals and security issues." Journal of Parallel and Distributed Computing 63, no. 10 (2003): 1006–14. http://dx.doi.org/10.1016/s0743-7315(03)00100-x.
Full textEskandarpour, Rozhin, Pranav Gokhale, Amin Khodaei, Frederic T. Chong, Aleksi Passo, and Shay Bahramirad. "Quantum Computing for Enhancing Grid Security." IEEE Transactions on Power Systems 35, no. 5 (2020): 4135–37. http://dx.doi.org/10.1109/tpwrs.2020.3004073.
Full textKumar, Munindra, and Prashant Kumar. "Security of Grid Computing: A Cryptographic Approach." International Journal of Computer Applications 164, no. 6 (2017): 1–3. http://dx.doi.org/10.5120/ijca2017913646.
Full textKim, Tai-hoon, and Wai-chi Fang. "Special section: Grid/distributed computing systems security." Future Generation Computer Systems 25, no. 3 (2009): 351. http://dx.doi.org/10.1016/j.future.2008.10.001.
Full textJiang, Yixin, Yunan Zhang, Aidong Xu, et al. "Security Risk Analysis of Grid Edge Computing." IOP Conference Series: Earth and Environmental Science 693, no. 1 (2021): 012034. http://dx.doi.org/10.1088/1755-1315/693/1/012034.
Full textZhang, Tao, Shou Ming Ma, Wei Min Lin, and Yuan Yuan Ma. "Constructing Secure Cloud Computing Platform for Strong Smart Grid." Advanced Materials Research 760-762 (September 2013): 1718–22. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1718.
Full textRamakrishnan, L. "Grid computing - Securing next-generation grids." IT Professional 6, no. 2 (2004): 34–39. http://dx.doi.org/10.1109/mitp.2004.1278860.
Full textDissertations / Theses on the topic "Security of grid computing"
Lorch, Markus. "PRIMA - Privilege Management and Authorization in Grid Computing Environments." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/26995.
Full textCooper, Andrew. "Towards a trusted grid architecture." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:42268964-c1db-4599-9dbc-a1ceb1015ef1.
Full textSchmidt, Matthias [Verfasser], and Bernd [Akademischer Betreuer] Freisleben. "Infrastructural Security for Virtualized Grid Computing / Matthias Schmidt. Betreuer: Bernd Freisleben." Marburg : Philipps-Universität Marburg, 2011. http://d-nb.info/1016532725/34.
Full textSchreiner, Steffen [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Bernd [Akademischer Betreuer] Freisleben. "A Security Architecture for e-Science Grid Computing / Steffen Schreiner. Betreuer: Johannes Buchmann ; Bernd Freisleben." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2015. http://d-nb.info/1111112169/34.
Full textSyed, Raheel Hassan. "Protecting grid computing networks from cross-domain attacks using security alert sharing mechanisms and classification of administrative domains in security levels." Thesis, Besançon, 2012. http://www.theses.fr/2012BESA2038/document.
Full textMousavi, Shoshtari Seyed Farid. "Cloud Computing Adoption in Iran as a Developing Country : A Tentative Framework Based on Experiences from Iran." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17236.
Full textWei, Longfei. "Game-Theoretic and Machine-Learning Techniques for Cyber-Physical Security and Resilience in Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3850.
Full textGómez, Ramírez Andrés [Verfasser], Udo [Gutachter] Kebschull, and Roberto V. [Gutachter] Zicari. "Deep learning and isolation based security for intrusion detection and prevention in grid computing / Andrés Gómez Ramírez ; Gutachter: Udo Kebschull, Roberto V. Zicari." Frankfurt am Main : Universitätsbibliothek Johann Christian Senckenberg, 2019. http://d-nb.info/1197838333/34.
Full textMattes, Leonardo. "GridMultiPolicy: gerenciamento e efetivação de múltiplas políticas de controle de acesso em ambientes de grades computacionais." Universidade de São Paulo, 2007. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-08012008-145925/.
Full textOliveira, Claudio Rodolfo Sousa de. "GSSA : uma arquitetura de segurança para grid services." Universidade Federal de São Carlos, 2009. https://repositorio.ufscar.br/handle/ufscar/403.
Full textBooks on the topic "Security of grid computing"
Kim, Tai-hoon, Adrian Stoica, and Ruay-Shiung Chang, eds. Security-Enriched Urban Computing and Smart Grid. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16444-6.
Full textChang, Ruay-Shiung, Tai-hoon Kim, and Sheng-Lung Peng, eds. Security-Enriched Urban Computing and Smart Grid. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23948-9.
Full textInternational Conference on Security-Enriched Urban Computing and Smart Grid (1st (2010 Taejŏn-si, Korea)). Security-enriched urban computing and smart grid: First International Conference, SUComS 2010, Daejeon, Korea, September 15-17, 2010, proceedings. Springer, 2010.
Find full textTai-hoon, Kim, Peng Sheng-Lung, and SpringerLink (Online service), eds. Security-Enriched Urban Computing and Smart Grid: Second International Conference, SUComS 2011, Hualien, Taiwan, September 21-23, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textCuellar, Jorge. Smart Grid Security: First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.
Find full textSuman, Nandi, Kumar Gaurav, Kumar Sandeep, and SpringerLink (Online service), eds. High Performance Architecture and Grid Computing: International Conference, HPAGC 2011, Chandigarh, India, July 19-20, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textCorrado, Priami, ed. Global computing: Programming environments, languages, security, and analysis of systems : IST/FET international workshop, GC 2003, Rovereto, Italy, February 9-14, 2003 : revised papers. Springer, 2003.
Find full textParashar, Manish, ed. Grid Computing — GRID 2002. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36133-2.
Full textBook chapters on the topic "Security of grid computing"
Luna, Jesus, Michail Flouris, Manolis Marazakis, et al. "A Data-Centric Security Analysis Of ICGrid." In Grid Computing. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09457-1_17.
Full textLee, Hyun-Jung, Youngsook Lee, and Dongho Won. "Security Requirement of End Point Security Software." In Grid and Pervasive Computing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38027-3_88.
Full textJaén Martínez, Javier, and JoséH Canós. "An Advanced Security Infrastructure for Heterogeneous Relational Grid Data Sources." In Grid Computing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24689-3_10.
Full textXie, Hongxia, and Fanrong Meng. "OGSA Security Authentication Services." In Grid and Cooperative Computing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24679-4_165.
Full textJiang, Zhonghua, Dongdai Lin, Lin Xu, and Lei Lin. "Integrating Grid with Cryptographic Computing." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11689522_30.
Full textYeo, Sang-Soo, and Jong Hyuk Park. "Security Considerations in Cloud Computing Virtualization Environment." In Grid and Pervasive Computing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38027-3_22.
Full textMao, Wenbo, Andrew Martin, Hai Jin, and Huanguo Zhang. "Innovations for Grid Security from Trusted Computing." In Security Protocols. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_18.
Full textMao, Wenbo. "Innovations for Grid Security from Trusted Computing." In Security Protocols. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_19.
Full textKaur, Puneet Jai, and Sakshi Kaushal. "Security Concerns in Cloud Computing." In High Performance Architecture and Grid Computing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22577-2_14.
Full textSharma, Pardeep, Sandeep K. Sood, and Sumeet Kaur. "Security Issues in Cloud Computing." In High Performance Architecture and Grid Computing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22577-2_5.
Full textConference papers on the topic "Security of grid computing"
Amin, K., G. von Laszewski, M. Sosonkin, A. R. Mikler, and M. Hategan. "Ad hoc grid security infrastructure." In The 6th IEEE/ACM International Workshop on Grid Computing, 2005. IEEE, 2005. http://dx.doi.org/10.1109/grid.2005.1542726.
Full textVictor Jose, M., and V. Seenivasagam. "Object Based Grid Architecture for enhancing security in grid computing." In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN). IEEE, 2011. http://dx.doi.org/10.1109/icsccn.2011.6024586.
Full textNiu, Zhongying, Hong Jiang, Ke Zhou, et al. "DSFS: Decentralized security for large parallel file systems." In 2010 11th IEEE/ACM International Conference on Grid Computing (GRID). IEEE, 2010. http://dx.doi.org/10.1109/grid.2010.5697947.
Full textHazlewood, Victor, Patricia Kovatch, Matthew Ezell, Matthew Johnson, and Patti Redd. "Improved Grid Security Posture through Multi-factor Authentication." In 2011 12th IEEE/ACM International Conference on Grid Computing (GRID). IEEE, 2011. http://dx.doi.org/10.1109/grid.2011.41.
Full textLiu, Guohua. "Using Security Proxy Based Trusted Computing Enhanced Grid Security Infrastructure." In 2010 2nd International Conference on Information Engineering and Computer Science (ICIECS). IEEE, 2010. http://dx.doi.org/10.1109/iciecs.2010.5677720.
Full textP, Varalakshmi, Thamarai Selvi S, GaneshKumar R, and Sundar Raman S. "Security in mobile grid service." In 2009 First International Conference on Advanced Computing (ICAC). IEEE, 2009. http://dx.doi.org/10.1109/icadvc.2009.5378207.
Full textLonea, Alina Madalina, and Daniela Elena Popescu. "Security issues for GRID systems." In 2010 4th International Workshop on Soft Computing Applications (SOFA). IEEE, 2010. http://dx.doi.org/10.1109/sofa.2010.5565622.
Full textRonghui Wu, Renfa Li, Fei Yu, Guangxue Yue, and Cheng Xu. "Research on User Authentication for Grid Computing Security." In Second International Conference on Semantics, Knowledge, and Grid (SKG 2006). IEEE, 2006. http://dx.doi.org/10.1109/skg.2006.78.
Full textBendahmane, A., M. Essaaidi, A. El Moussaoui, and A. Younes. "Grid computing security mechanisms: State-of-the-art." In 2009 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2009. http://dx.doi.org/10.1109/mmcs.2009.5256638.
Full textYu, Jianhua, Yue Luo, and Xueli Wang. "Deceptive Detection and Security Reinforcement in Grid Computing." In 2013 International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2013. http://dx.doi.org/10.1109/incos.2013.30.
Full textReports on the topic "Security of grid computing"
Steven Crumb. Grid Computing Education Support. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/922233.
Full textEarl, Charles. Insightful Workflow For Grid Computing. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/941421.
Full textRoss, Virginia W., and Scott E. Spetka. Grid Computing for High Performance Computing (HPC) Data Centers. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada466685.
Full textDebenedictis, Erik, Fredrick Rothganger, James Bradley Aimone, et al. Cognitive Computing for Security. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1234812.
Full textBose, Anjan, Vaithianathan Venkatasubramanian, Carl Hauser, et al. Power grid reliability and security. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1173069.
Full textHamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. Security Issues for Cloud Computing. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada545053.
Full textMyers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053534.
Full textMyers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053535.
Full textRana, Abhishek S. A Globally Distributed Grid Monitoring System to Facilitate High-Performance Computing at D0/SAM-Grid. Office of Scientific and Technical Information (OSTI), 2002. http://dx.doi.org/10.2172/1421666.
Full textRay, Indrakshi, and Indrajit Ray. Addressing Security Challenges in Pervasive Computing Applications. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada567481.
Full text