Academic literature on the topic 'Security of grid computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security of grid computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security of grid computing"

1

Mishra, Neha, Ritu Yadav, and Saurabh Maheshwari. "Security Issues in Grid Computing." International Journal on Computational Science & Applications 4, no. 1 (2014): 179–87. http://dx.doi.org/10.5121/ijcsa.2014.4118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chakrabarti, Anirban, Anish Damodaran, and Shubhashis Sengupta. "Grid Computing Security: A Taxonomy." IEEE Security & Privacy Magazine 6, no. 1 (2008): 44–51. http://dx.doi.org/10.1109/msp.2008.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Damoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam, and Brighter Agyeman. "Improving Security Measures on Grid Computing." International Journal of Computer Applications 83, no. 9 (2013): 6–11. http://dx.doi.org/10.5120/14474-2490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Butt, Ali Raza, Sumalatha Adabala, Nirav H. Kapadia, Renato J. Figueiredo, and José A. B. Fortes. "Grid-computing portals and security issues." Journal of Parallel and Distributed Computing 63, no. 10 (2003): 1006–14. http://dx.doi.org/10.1016/s0743-7315(03)00100-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eskandarpour, Rozhin, Pranav Gokhale, Amin Khodaei, Frederic T. Chong, Aleksi Passo, and Shay Bahramirad. "Quantum Computing for Enhancing Grid Security." IEEE Transactions on Power Systems 35, no. 5 (2020): 4135–37. http://dx.doi.org/10.1109/tpwrs.2020.3004073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Munindra, and Prashant Kumar. "Security of Grid Computing: A Cryptographic Approach." International Journal of Computer Applications 164, no. 6 (2017): 1–3. http://dx.doi.org/10.5120/ijca2017913646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Tai-hoon, and Wai-chi Fang. "Special section: Grid/distributed computing systems security." Future Generation Computer Systems 25, no. 3 (2009): 351. http://dx.doi.org/10.1016/j.future.2008.10.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Yixin, Yunan Zhang, Aidong Xu, et al. "Security Risk Analysis of Grid Edge Computing." IOP Conference Series: Earth and Environmental Science 693, no. 1 (2021): 012034. http://dx.doi.org/10.1088/1755-1315/693/1/012034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Tao, Shou Ming Ma, Wei Min Lin, and Yuan Yuan Ma. "Constructing Secure Cloud Computing Platform for Strong Smart Grid." Advanced Materials Research 760-762 (September 2013): 1718–22. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1718.

Full text
Abstract:
As a new paradigm for hosting and delivering services over the Internet, cloud computing technology especially suitable for dealing with series of problems in strong smart grid. However, despite the fact that cloud computing offers huge opportunities to the strong smart grid, the development of cloud computing technology is currently at its infancy, especially with many security issues to be addressed. In this paper, we present the overall architecture and benefits of cloud computing applications in strong smart grid. After that, we propose a unified security protection system framework of pow
APA, Harvard, Vancouver, ISO, and other styles
10

Ramakrishnan, L. "Grid computing - Securing next-generation grids." IT Professional 6, no. 2 (2004): 34–39. http://dx.doi.org/10.1109/mitp.2004.1278860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security of grid computing"

1

Lorch, Markus. "PRIMA - Privilege Management and Authorization in Grid Computing Environments." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/26995.

Full text
Abstract:
Computational grids and other heterogeneous, large-scale distributed systems require more powerful and more flexible authorization mechanisms to realize fine-grained access-control of resources. Computational grids are increasingly used for collaborative problem-solving and advanced science and engineering applications. Usage scenarios for advanced grids require support for small, dynamic working groups, direct delegation of access privileges among users, procedures for establishing trust relationships without requiring organizational level agreements, precise management by individuals of thei
APA, Harvard, Vancouver, ISO, and other styles
2

Cooper, Andrew. "Towards a trusted grid architecture." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:42268964-c1db-4599-9dbc-a1ceb1015ef1.

Full text
Abstract:
The malicious host problem is challenging in distributed systems such as grids and clouds. Rival organisations may share the same physical infrastructure. Administrators might deliberately or accidentally compromise users' data. The thesis concerns the development of a security architecture that allows users to place a high degree of trust in remote systems to process their data securely. The problem is tackled through a new security layer that ensures users' data can only be accessed within a trusted execution environment. Access to encrypted programs and data is authorised by a key managemen
APA, Harvard, Vancouver, ISO, and other styles
3

Schmidt, Matthias [Verfasser], and Bernd [Akademischer Betreuer] Freisleben. "Infrastructural Security for Virtualized Grid Computing / Matthias Schmidt. Betreuer: Bernd Freisleben." Marburg : Philipps-Universität Marburg, 2011. http://d-nb.info/1016532725/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schreiner, Steffen [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Bernd [Akademischer Betreuer] Freisleben. "A Security Architecture for e-Science Grid Computing / Steffen Schreiner. Betreuer: Johannes Buchmann ; Bernd Freisleben." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2015. http://d-nb.info/1111112169/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Syed, Raheel Hassan. "Protecting grid computing networks from cross-domain attacks using security alert sharing mechanisms and classification of administrative domains in security levels." Thesis, Besançon, 2012. http://www.theses.fr/2012BESA2038/document.

Full text
Abstract:
Ces dernières années, la sécurité est devenue un défi dans les réseaux informatiques. Les logiciels anti-virus, les pare-feu et les systèmes de détection d'intrusion ne suffisent pas à empêcher les attaques sophistiquées fabriquées par plusieurs utilisateurs. Les réseaux informatiques de grille sont souvent composés de différents domaines administratifs appartenant à différentes organisations. Chaque domaine peut avoir sa propre politique de sécurité et ne pas vouloir partager ses données de sécurité avec des réseaux moins protégés. Il est donc plus complexe d'assurer la sécurité de ces réseau
APA, Harvard, Vancouver, ISO, and other styles
6

Mousavi, Shoshtari Seyed Farid. "Cloud Computing Adoption in Iran as a Developing Country : A Tentative Framework Based on Experiences from Iran." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17236.

Full text
Abstract:
The employment of the right technology in an organisation can provide major competitiveadvantages. Not only in organisations, but at a higher level, governments are seeking for newtechnologies to enhance their services while minimising the costs. Although, there might beno precise definition for cloud computing, the tremendous advantages and benefits of this newtechnology has turn cloud computing to the hottest topic in Information Technology.The remarkable effects of cloud computing in economy have already stimulated thedeveloped countries to deploy this technology in national level. Nonethel
APA, Harvard, Vancouver, ISO, and other styles
7

Wei, Longfei. "Game-Theoretic and Machine-Learning Techniques for Cyber-Physical Security and Resilience in Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3850.

Full text
Abstract:
The smart grid is the next-generation electrical infrastructure utilizing Information and Communication Technologies (ICTs), whose architecture is evolving from a utility-centric structure to a distributed Cyber-Physical System (CPS) integrated with a large-scale of renewable energy resources. However, meeting reliability objectives in the smart grid becomes increasingly challenging owing to the high penetration of renewable resources and changing weather conditions. Moreover, the cyber-physical attack targeted at the smart grid has become a major threat because millions of electronic devices
APA, Harvard, Vancouver, ISO, and other styles
8

Gómez, Ramírez Andrés [Verfasser], Udo [Gutachter] Kebschull, and Roberto V. [Gutachter] Zicari. "Deep learning and isolation based security for intrusion detection and prevention in grid computing / Andrés Gómez Ramírez ; Gutachter: Udo Kebschull, Roberto V. Zicari." Frankfurt am Main : Universitätsbibliothek Johann Christian Senckenberg, 2019. http://d-nb.info/1197838333/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mattes, Leonardo. "GridMultiPolicy: gerenciamento e efetivação de múltiplas políticas de controle de acesso em ambientes de grades computacionais." Universidade de São Paulo, 2007. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-08012008-145925/.

Full text
Abstract:
O termo grade computacional faz referência a uma classe de sistemas distribuídos que permitem a associação e a integração de múltiplos domínios em organizações virtuais. Um serviço de controle de acesso coerente a sistemas com estas características deve ser flexível para integrar múltiplas políticas, permitindo que administradores, sítios e usuários determinem as regras e os mecanismos para proteger seus recursos. Esta tese apresenta o GridMultiPolicy, um sistema flexível para o gerenciamento e a integração de múltiplas políticas e mecanismos para a efetivação de controle de acesso em ambiente
APA, Harvard, Vancouver, ISO, and other styles
10

Oliveira, Claudio Rodolfo Sousa de. "GSSA : uma arquitetura de segurança para grid services." Universidade Federal de São Carlos, 2009. https://repositorio.ufscar.br/handle/ufscar/403.

Full text
Abstract:
Made available in DSpace on 2016-06-02T19:05:35Z (GMT). No. of bitstreams: 1 2565.pdf: 3480971 bytes, checksum: d77b25ab6ff234cafc2664267466f051 (MD5) Previous issue date: 2009-05-25<br>Financiadora de Estudos e Projetos<br>Existing mechanisms for Grid Service (GS) security control do not allow transparently binding different user roles and permissions in the access control for operations and resources. After successfuly authenticated a user may access all registered services. This dissertation presents the GS Security Architecture (GSSA), a security architecture for GSs based on the Open GS
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security of grid computing"

1

Grid computing security. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chakrabarti, Anirban. Grid computing security. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Tai-hoon, Adrian Stoica, and Ruay-Shiung Chang, eds. Security-Enriched Urban Computing and Smart Grid. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16444-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chang, Ruay-Shiung, Tai-hoon Kim, and Sheng-Lung Peng, eds. Security-Enriched Urban Computing and Smart Grid. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23948-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

International Conference on Security-Enriched Urban Computing and Smart Grid (1st (2010 Taejŏn-si, Korea)). Security-enriched urban computing and smart grid: First International Conference, SUComS 2010, Daejeon, Korea, September 15-17, 2010, proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tai-hoon, Kim, Peng Sheng-Lung, and SpringerLink (Online service), eds. Security-Enriched Urban Computing and Smart Grid: Second International Conference, SUComS 2011, Hualien, Taiwan, September 21-23, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cuellar, Jorge. Smart Grid Security: First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Suman, Nandi, Kumar Gaurav, Kumar Sandeep, and SpringerLink (Online service), eds. High Performance Architecture and Grid Computing: International Conference, HPAGC 2011, Chandigarh, India, July 19-20, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Corrado, Priami, ed. Global computing: Programming environments, languages, security, and analysis of systems : IST/FET international workshop, GC 2003, Rovereto, Italy, February 9-14, 2003 : revised papers. Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Parashar, Manish, ed. Grid Computing — GRID 2002. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36133-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security of grid computing"

1

Luna, Jesus, Michail Flouris, Manolis Marazakis, et al. "A Data-Centric Security Analysis Of ICGrid." In Grid Computing. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09457-1_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Hyun-Jung, Youngsook Lee, and Dongho Won. "Security Requirement of End Point Security Software." In Grid and Pervasive Computing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38027-3_88.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jaén Martínez, Javier, and JoséH Canós. "An Advanced Security Infrastructure for Heterogeneous Relational Grid Data Sources." In Grid Computing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24689-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xie, Hongxia, and Fanrong Meng. "OGSA Security Authentication Services." In Grid and Cooperative Computing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24679-4_165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jiang, Zhonghua, Dongdai Lin, Lin Xu, and Lei Lin. "Integrating Grid with Cryptographic Computing." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11689522_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yeo, Sang-Soo, and Jong Hyuk Park. "Security Considerations in Cloud Computing Virtualization Environment." In Grid and Pervasive Computing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38027-3_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mao, Wenbo, Andrew Martin, Hai Jin, and Huanguo Zhang. "Innovations for Grid Security from Trusted Computing." In Security Protocols. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mao, Wenbo. "Innovations for Grid Security from Trusted Computing." In Security Protocols. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04904-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaur, Puneet Jai, and Sakshi Kaushal. "Security Concerns in Cloud Computing." In High Performance Architecture and Grid Computing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22577-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Pardeep, Sandeep K. Sood, and Sumeet Kaur. "Security Issues in Cloud Computing." In High Performance Architecture and Grid Computing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22577-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security of grid computing"

1

Amin, K., G. von Laszewski, M. Sosonkin, A. R. Mikler, and M. Hategan. "Ad hoc grid security infrastructure." In The 6th IEEE/ACM International Workshop on Grid Computing, 2005. IEEE, 2005. http://dx.doi.org/10.1109/grid.2005.1542726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Victor Jose, M., and V. Seenivasagam. "Object Based Grid Architecture for enhancing security in grid computing." In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN). IEEE, 2011. http://dx.doi.org/10.1109/icsccn.2011.6024586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Niu, Zhongying, Hong Jiang, Ke Zhou, et al. "DSFS: Decentralized security for large parallel file systems." In 2010 11th IEEE/ACM International Conference on Grid Computing (GRID). IEEE, 2010. http://dx.doi.org/10.1109/grid.2010.5697947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hazlewood, Victor, Patricia Kovatch, Matthew Ezell, Matthew Johnson, and Patti Redd. "Improved Grid Security Posture through Multi-factor Authentication." In 2011 12th IEEE/ACM International Conference on Grid Computing (GRID). IEEE, 2011. http://dx.doi.org/10.1109/grid.2011.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Guohua. "Using Security Proxy Based Trusted Computing Enhanced Grid Security Infrastructure." In 2010 2nd International Conference on Information Engineering and Computer Science (ICIECS). IEEE, 2010. http://dx.doi.org/10.1109/iciecs.2010.5677720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

P, Varalakshmi, Thamarai Selvi S, GaneshKumar R, and Sundar Raman S. "Security in mobile grid service." In 2009 First International Conference on Advanced Computing (ICAC). IEEE, 2009. http://dx.doi.org/10.1109/icadvc.2009.5378207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lonea, Alina Madalina, and Daniela Elena Popescu. "Security issues for GRID systems." In 2010 4th International Workshop on Soft Computing Applications (SOFA). IEEE, 2010. http://dx.doi.org/10.1109/sofa.2010.5565622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, and Cheng Xu. "Research on User Authentication for Grid Computing Security." In Second International Conference on Semantics, Knowledge, and Grid (SKG 2006). IEEE, 2006. http://dx.doi.org/10.1109/skg.2006.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bendahmane, A., M. Essaaidi, A. El Moussaoui, and A. Younes. "Grid computing security mechanisms: State-of-the-art." In 2009 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2009. http://dx.doi.org/10.1109/mmcs.2009.5256638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Jianhua, Yue Luo, and Xueli Wang. "Deceptive Detection and Security Reinforcement in Grid Computing." In 2013 International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2013. http://dx.doi.org/10.1109/incos.2013.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security of grid computing"

1

Steven Crumb. Grid Computing Education Support. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/922233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Earl, Charles. Insightful Workflow For Grid Computing. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/941421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ross, Virginia W., and Scott E. Spetka. Grid Computing for High Performance Computing (HPC) Data Centers. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada466685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Debenedictis, Erik, Fredrick Rothganger, James Bradley Aimone, et al. Cognitive Computing for Security. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1234812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bose, Anjan, Vaithianathan Venkatasubramanian, Carl Hauser, et al. Power grid reliability and security. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1173069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. Security Issues for Cloud Computing. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada545053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Myers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Myers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rana, Abhishek S. A Globally Distributed Grid Monitoring System to Facilitate High-Performance Computing at D0/SAM-Grid. Office of Scientific and Technical Information (OSTI), 2002. http://dx.doi.org/10.2172/1421666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ray, Indrakshi, and Indrajit Ray. Addressing Security Challenges in Pervasive Computing Applications. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada567481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!