Journal articles on the topic 'Security of grid computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security of grid computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mishra, Neha, Ritu Yadav, and Saurabh Maheshwari. "Security Issues in Grid Computing." International Journal on Computational Science & Applications 4, no. 1 (2014): 179–87. http://dx.doi.org/10.5121/ijcsa.2014.4118.
Full textChakrabarti, Anirban, Anish Damodaran, and Shubhashis Sengupta. "Grid Computing Security: A Taxonomy." IEEE Security & Privacy Magazine 6, no. 1 (2008): 44–51. http://dx.doi.org/10.1109/msp.2008.12.
Full textDamoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam, and Brighter Agyeman. "Improving Security Measures on Grid Computing." International Journal of Computer Applications 83, no. 9 (2013): 6–11. http://dx.doi.org/10.5120/14474-2490.
Full textButt, Ali Raza, Sumalatha Adabala, Nirav H. Kapadia, Renato J. Figueiredo, and José A. B. Fortes. "Grid-computing portals and security issues." Journal of Parallel and Distributed Computing 63, no. 10 (2003): 1006–14. http://dx.doi.org/10.1016/s0743-7315(03)00100-x.
Full textEskandarpour, Rozhin, Pranav Gokhale, Amin Khodaei, Frederic T. Chong, Aleksi Passo, and Shay Bahramirad. "Quantum Computing for Enhancing Grid Security." IEEE Transactions on Power Systems 35, no. 5 (2020): 4135–37. http://dx.doi.org/10.1109/tpwrs.2020.3004073.
Full textKumar, Munindra, and Prashant Kumar. "Security of Grid Computing: A Cryptographic Approach." International Journal of Computer Applications 164, no. 6 (2017): 1–3. http://dx.doi.org/10.5120/ijca2017913646.
Full textKim, Tai-hoon, and Wai-chi Fang. "Special section: Grid/distributed computing systems security." Future Generation Computer Systems 25, no. 3 (2009): 351. http://dx.doi.org/10.1016/j.future.2008.10.001.
Full textJiang, Yixin, Yunan Zhang, Aidong Xu, et al. "Security Risk Analysis of Grid Edge Computing." IOP Conference Series: Earth and Environmental Science 693, no. 1 (2021): 012034. http://dx.doi.org/10.1088/1755-1315/693/1/012034.
Full textZhang, Tao, Shou Ming Ma, Wei Min Lin, and Yuan Yuan Ma. "Constructing Secure Cloud Computing Platform for Strong Smart Grid." Advanced Materials Research 760-762 (September 2013): 1718–22. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1718.
Full textRamakrishnan, L. "Grid computing - Securing next-generation grids." IT Professional 6, no. 2 (2004): 34–39. http://dx.doi.org/10.1109/mitp.2004.1278860.
Full textLiu Lizhao, Zhu Shunzhi, Wu Yun, and Li Qi. "Distributed Communication Security Decision Modeling in Grid Computing." International Journal of Advancements in Computing Technology 5, no. 4 (2013): 556–63. http://dx.doi.org/10.4156/ijact.vol5.issue4.66.
Full textFei, Yan, Zhang Huanguo, Sun Qi, Shen Zhidong, Zhang Liqiang, and Qiang Weizhong. "An improved grid security infrastructure by trusted computing." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1805–8. http://dx.doi.org/10.1007/bf02831880.
Full textCody, Erin, Raj Sharman, Raghav H. Rao, and Shambhu Upadhyaya. "Security in grid computing: A review and synthesis." Decision Support Systems 44, no. 4 (2008): 749–64. http://dx.doi.org/10.1016/j.dss.2007.09.007.
Full textS, Smys, Abul Bashar, and Haoxiang Wang. "SECURE AND SUSTAINABLE SMART GRID FRAME WORK USING THE CLOUD COMPUTING." Journal of ISMAC 01, no. 03 (2019): 137–46. http://dx.doi.org/10.36548/jismac.2019.3.001.
Full textSungkar, Armu, and Tena Kogoya. "A REVIEW OF GRID COMPUTING." Computer Science & IT Research Journal 1, no. 1 (2020): 1–6. http://dx.doi.org/10.51594/csitrj.v1i1.128.
Full textZasada, Stefan J., Ali N. Haidar, and Peter V. Coveney. "On the usability of grid middleware and security mechanisms." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 369, no. 1949 (2011): 3413–28. http://dx.doi.org/10.1098/rsta.2011.0131.
Full textYu, Jian. "Grid Computing Based Middleware for Labor and Social Security Data Storage Resources Discovery." Applied Mechanics and Materials 148-149 (December 2011): 1425–28. http://dx.doi.org/10.4028/www.scientific.net/amm.148-149.1425.
Full textDorothy, R., and Sasilatha Sasilatha. "Smart Grid Systems Based Survey on Cyber Security Issues." Bulletin of Electrical Engineering and Informatics 6, no. 4 (2017): 337–42. http://dx.doi.org/10.11591/eei.v6i4.862.
Full textK.SAI MANOJ, Dr. "Cloud security: risk factors and security issues in current trends." International Journal of Engineering & Technology 8, no. 4 (2019): 424. http://dx.doi.org/10.14419/ijet.v8i4.29655.
Full textKim, JeongYeon, and Yanghoon Kim. "Benefits of cloud computing adoption for smart grid security from security perspective." Journal of Supercomputing 72, no. 9 (2015): 3522–34. http://dx.doi.org/10.1007/s11227-015-1547-0.
Full text., Harmeet Kaur. "COMPARISON OF DATA SECURITY IN GRID AND CLOUD COMPUTING." International Journal of Research in Engineering and Technology 02, no. 09 (2013): 136–45. http://dx.doi.org/10.15623/ijret.2013.0209022.
Full textS.SyedNavaz, A., C. Prabhadevi, and V. Sangeetha. "Data Grid Concepts for Data Security in Distributed Computing." International Journal of Computer Applications 61, no. 13 (2013): 6–11. http://dx.doi.org/10.5120/9986-4823.
Full textAlmadhor, Ahmad. "A Fog Computing based Smart Grid Cloud Data Security." International Journal of Applied Information Systems 10, no. 6 (2016): 1–6. http://dx.doi.org/10.5120/ijais2016451515.
Full textR.Menaka, Author, and R. S. D. Wahidha Banu. "Security Analysis in Hierarchical Resource Arrangements in Grid Computing." International Journal of Computer Applications 24, no. 6 (2011): 34–39. http://dx.doi.org/10.5120/2947-3930.
Full textSong, Shanshan, Kai Hwang, and Yu-Kwong Kwok. "Trusted Grid Computing with Security Binding and Trust Integration." Journal of Grid Computing 3, no. 1-2 (2005): 53–73. http://dx.doi.org/10.1007/s10723-005-5465-x.
Full textBen Dhaou, Imed, Aron Kondoro, Amleset Kelati, et al. "Communication and Security Technologies for Smart Grid." International Journal of Embedded and Real-Time Communication Systems 8, no. 2 (2017): 40–65. http://dx.doi.org/10.4018/ijertcs.2017070103.
Full textZhou, Guo Hong. "Study of Cloud Computing and Advanced Manufacturing Technology under Information Technology Development." Applied Mechanics and Materials 484-485 (January 2014): 227–30. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.227.
Full textBai, Qing Hai, Ying Zheng, Qing Hu Wang, Guo Li Wei, Hai Chun Zhao, and Jing Long Zhang. "Research on Identity-Based Encryption Scheme for Grid Computing System." Applied Mechanics and Materials 543-547 (March 2014): 3156–59. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3156.
Full textKaramizadeh, Sasan, Jafar Shayan, Mojtaba Alizadeh, and Atabak Kheirkhah. "Information Security Awareness Behavior : A Conceptual Model for Cloud." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 1 (2013): 1186–91. http://dx.doi.org/10.24297/ijct.v10i1.3322.
Full textTusa, Francesco, Massimo Villari, and Antonio Puliafito. "Credential Management Enforcement and Secure Data Storage in gLite." International Journal of Distributed Systems and Technologies 1, no. 1 (2010): 76–97. http://dx.doi.org/10.4018/jdst.2010090805.
Full textAdamski, Marcin, Krzysztof Kurowski, Marek Mika, Wojciech Piątek, and Jan Węglarz. "Security Aspects in Resource Management Systems in Distributed Computing Environments." Foundations of Computing and Decision Sciences 42, no. 4 (2017): 299–313. http://dx.doi.org/10.1515/fcds-2017-0015.
Full textKant Hiran, Kamal, Ruchi Doshi, and Rakesh Rathi. "Security & Privacy issues of Cloud & Grid Computing Networks." International Journal on Computational Science & Applications 4, no. 1 (2014): 83–91. http://dx.doi.org/10.5121/ijcsa.2014.4108.
Full textMann, Kulvinder Singh, and Ankit Bansal. "Security of Data of EHR in a Grid Computing Environment." International Journal of Computer Applications 7, no. 6 (2010): 11–14. http://dx.doi.org/10.5120/1168-1307.
Full textHwang, Kai, Min Cai, Yu Kwong Kwok, Shanshan Song, Yu Chen, and Ying Chen. "DHT-based security infrastructure for trusted internet and grid computing." International Journal of Critical Infrastructures 2, no. 4 (2006): 412. http://dx.doi.org/10.1504/ijcis.2006.011348.
Full textMahajan, Rini, and Dr Dheerendra Singh. "Cloud Computing Issues." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 626–30. http://dx.doi.org/10.24297/ijct.v4i2c2.4185.
Full textWeijie, Zheng, Xu Dechao, Chen Yong, Zhang Xing, and Mu Qing. "Multi Step Transient Hybrid Simulation Framework Design and Practical Engineering Application for AC / DC Power Grid." E3S Web of Conferences 256 (2021): 01010. http://dx.doi.org/10.1051/e3sconf/202125601010.
Full textBai, Qing Hai, Ying Zheng, and Lin Na Zhao. "The Application of IBE Encryption Scheme in Grid Environments." Applied Mechanics and Materials 551 (May 2014): 686–90. http://dx.doi.org/10.4028/www.scientific.net/amm.551.686.
Full textDeng, Song, Wei Min Lin, Tao Zhang, and Yuan Yuan Ma. "Security Access of Power terminal on Trusted Computing in Smart Grid." Applied Mechanics and Materials 241-244 (December 2012): 2659–64. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2659.
Full textYu, Qiu Dong, Yun Chen Tian, and Xu Feng Hua. "Research on Security of Agricultural Information Model Based on Cloud Computing." Applied Mechanics and Materials 687-691 (November 2014): 1970–73. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1970.
Full textTang, Bi Qiang, Yi Jun Yu, Shu Hai Feng, and Feng Li. "A Novel Method of Static Security Analysis Based on Multithread Technology." Advanced Materials Research 732-733 (August 2013): 639–45. http://dx.doi.org/10.4028/www.scientific.net/amr.732-733.639.
Full textKolosok, Irina, and Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation." E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.
Full textJaiswal, Rituka, Reggie Davidrajuh, and Chunming Rong. "Fog Computing for Realizing Smart Neighborhoods in Smart Grids." Computers 9, no. 3 (2020): 76. http://dx.doi.org/10.3390/computers9030076.
Full textSharma, Gaurav, Urvashi Garg, A.P, Arun Jain, A.P, and Loveleena Mukhija, A.P. "Cloud Computing : Security Issues And Resource Allocation Policies." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 176. http://dx.doi.org/10.23956/ijarcsse/v7i7/0116.
Full textRahman, Gohar, and Chuah Chai Wen. "Fog Computing, Applications, Security and Challenges, Review." International Journal of Engineering & Technology 7, no. 3 (2018): 1615. http://dx.doi.org/10.14419/ijet.v7i3.12612.
Full textLu, Zhi Yong, Yi Jun Zhang, Luan Yang, Shi Ping Xu, and Yuan You Chen. "Research on the Security Technologies of Power Grid EMS Based on SOA." Applied Mechanics and Materials 347-350 (August 2013): 1846–51. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1846.
Full textZhu, You Chan, and Juan Hua Bai. "A Study of Push-Based Sequence Authorization Mechanism for Grid Security." Applied Mechanics and Materials 63-64 (June 2011): 59–63. http://dx.doi.org/10.4028/www.scientific.net/amm.63-64.59.
Full textNamane, Sarra, and Nassira Ghoualmi. "Parallel Access Control Model in Cross-Domain Grid Computing Environment." International Journal of Embedded and Real-Time Communication Systems 9, no. 1 (2018): 50–65. http://dx.doi.org/10.4018/ijertcs.2018010103.
Full textCrooks, David, Liviu Vâlsan, Kashif Mohammad, et al. "Operational security, threat intelligence & distributed computing: the WLCG Security Operations Center Working Group." EPJ Web of Conferences 214 (2019): 03029. http://dx.doi.org/10.1051/epjconf/201921403029.
Full textMehmood, M. Yasir, Ammar Oad, Muhammad Abrar, et al. "Edge Computing for IoT-Enabled Smart Grid." Security and Communication Networks 2021 (July 13, 2021): 1–16. http://dx.doi.org/10.1155/2021/5524025.
Full textRiguidel, M., I. Demeure, and S. Naqvi. "Security Architecture for Health Grid Using Ambient Intelligence." Methods of Information in Medicine 44, no. 02 (2005): 202–6. http://dx.doi.org/10.1055/s-0038-1633947.
Full text