To see the other types of publications on this topic, follow the link: Security of grid computing.

Journal articles on the topic 'Security of grid computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security of grid computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mishra, Neha, Ritu Yadav, and Saurabh Maheshwari. "Security Issues in Grid Computing." International Journal on Computational Science & Applications 4, no. 1 (2014): 179–87. http://dx.doi.org/10.5121/ijcsa.2014.4118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chakrabarti, Anirban, Anish Damodaran, and Shubhashis Sengupta. "Grid Computing Security: A Taxonomy." IEEE Security & Privacy Magazine 6, no. 1 (2008): 44–51. http://dx.doi.org/10.1109/msp.2008.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Damoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam, and Brighter Agyeman. "Improving Security Measures on Grid Computing." International Journal of Computer Applications 83, no. 9 (2013): 6–11. http://dx.doi.org/10.5120/14474-2490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Butt, Ali Raza, Sumalatha Adabala, Nirav H. Kapadia, Renato J. Figueiredo, and José A. B. Fortes. "Grid-computing portals and security issues." Journal of Parallel and Distributed Computing 63, no. 10 (2003): 1006–14. http://dx.doi.org/10.1016/s0743-7315(03)00100-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eskandarpour, Rozhin, Pranav Gokhale, Amin Khodaei, Frederic T. Chong, Aleksi Passo, and Shay Bahramirad. "Quantum Computing for Enhancing Grid Security." IEEE Transactions on Power Systems 35, no. 5 (2020): 4135–37. http://dx.doi.org/10.1109/tpwrs.2020.3004073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Munindra, and Prashant Kumar. "Security of Grid Computing: A Cryptographic Approach." International Journal of Computer Applications 164, no. 6 (2017): 1–3. http://dx.doi.org/10.5120/ijca2017913646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Tai-hoon, and Wai-chi Fang. "Special section: Grid/distributed computing systems security." Future Generation Computer Systems 25, no. 3 (2009): 351. http://dx.doi.org/10.1016/j.future.2008.10.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Yixin, Yunan Zhang, Aidong Xu, et al. "Security Risk Analysis of Grid Edge Computing." IOP Conference Series: Earth and Environmental Science 693, no. 1 (2021): 012034. http://dx.doi.org/10.1088/1755-1315/693/1/012034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Tao, Shou Ming Ma, Wei Min Lin, and Yuan Yuan Ma. "Constructing Secure Cloud Computing Platform for Strong Smart Grid." Advanced Materials Research 760-762 (September 2013): 1718–22. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1718.

Full text
Abstract:
As a new paradigm for hosting and delivering services over the Internet, cloud computing technology especially suitable for dealing with series of problems in strong smart grid. However, despite the fact that cloud computing offers huge opportunities to the strong smart grid, the development of cloud computing technology is currently at its infancy, especially with many security issues to be addressed. In this paper, we present the overall architecture and benefits of cloud computing applications in strong smart grid. After that, we propose a unified security protection system framework of pow
APA, Harvard, Vancouver, ISO, and other styles
10

Ramakrishnan, L. "Grid computing - Securing next-generation grids." IT Professional 6, no. 2 (2004): 34–39. http://dx.doi.org/10.1109/mitp.2004.1278860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Liu Lizhao, Zhu Shunzhi, Wu Yun, and Li Qi. "Distributed Communication Security Decision Modeling in Grid Computing." International Journal of Advancements in Computing Technology 5, no. 4 (2013): 556–63. http://dx.doi.org/10.4156/ijact.vol5.issue4.66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Fei, Yan, Zhang Huanguo, Sun Qi, Shen Zhidong, Zhang Liqiang, and Qiang Weizhong. "An improved grid security infrastructure by trusted computing." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1805–8. http://dx.doi.org/10.1007/bf02831880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Cody, Erin, Raj Sharman, Raghav H. Rao, and Shambhu Upadhyaya. "Security in grid computing: A review and synthesis." Decision Support Systems 44, no. 4 (2008): 749–64. http://dx.doi.org/10.1016/j.dss.2007.09.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

S, Smys, Abul Bashar, and Haoxiang Wang. "SECURE AND SUSTAINABLE SMART GRID FRAME WORK USING THE CLOUD COMPUTING." Journal of ISMAC 01, no. 03 (2019): 137–46. http://dx.doi.org/10.36548/jismac.2019.3.001.

Full text
Abstract:
The smart grid developments turning out to a promising technology for the two way communication of the electricity and the information are becoming more prominent in the present scenario due to the increasing demands in the power requirements. The smart grid utilizing the modern communication and the computing infrastructure makes this possible. This utilization of the modern communication and the computing systems make them even prone to the vulnerabilities, mishandlings and the miscommunications and necessary for a complex frame work for managing of the power distribution and generation to m
APA, Harvard, Vancouver, ISO, and other styles
15

Sungkar, Armu, and Tena Kogoya. "A REVIEW OF GRID COMPUTING." Computer Science & IT Research Journal 1, no. 1 (2020): 1–6. http://dx.doi.org/10.51594/csitrj.v1i1.128.

Full text
Abstract:
Grid computing is a combination of interconnected resources which can be spread all over the world having higher computing capabilities. The benefit of grid computing includes higher computation and memory capacity because of grid resources spread all over the world. The grid computing is managed by intra-grid scope which refers to the methodologies and the algorithms used for managing the grid network related issues such as task scheduling, resource balancing and security of the network. The advantages of grid computing include access to inaccessible resources, resource utilization and balanc
APA, Harvard, Vancouver, ISO, and other styles
16

Zasada, Stefan J., Ali N. Haidar, and Peter V. Coveney. "On the usability of grid middleware and security mechanisms." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 369, no. 1949 (2011): 3413–28. http://dx.doi.org/10.1098/rsta.2011.0131.

Full text
Abstract:
Usability is an all too often neglected aspect of grid computing, although it is one of the principal factors militating against the widespread uptake of distributed computing. Many resource providers on a grid infrastructure deploy a standard middleware stack and expect users to invoke the default client tools for that middleware stack to access their resources. Unfortunately, many of these middleware client tools have been developed as an afterthought, and are widely considered difficult to use. Such tools typically require a user to interact with a machine, to stage data and launch jobs, an
APA, Harvard, Vancouver, ISO, and other styles
17

Yu, Jian. "Grid Computing Based Middleware for Labor and Social Security Data Storage Resources Discovery." Applied Mechanics and Materials 148-149 (December 2011): 1425–28. http://dx.doi.org/10.4028/www.scientific.net/amm.148-149.1425.

Full text
Abstract:
Labor and social security social insurance and employment related to large groups of services. The labor security department of information technology often combined with computational grid computing systems. This paper presents a new kind of data grid middleware for data storage resources discovery and dynamic management in labor and social security resources environment. The architecture of grid storage resources discovery and dynamic management is presented for discovering data storage resources from the different computer organizational structure. The middleware can realize the necessary f
APA, Harvard, Vancouver, ISO, and other styles
18

Dorothy, R., and Sasilatha Sasilatha. "Smart Grid Systems Based Survey on Cyber Security Issues." Bulletin of Electrical Engineering and Informatics 6, no. 4 (2017): 337–42. http://dx.doi.org/10.11591/eei.v6i4.862.

Full text
Abstract:
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power
APA, Harvard, Vancouver, ISO, and other styles
19

K.SAI MANOJ, Dr. "Cloud security: risk factors and security issues in current trends." International Journal of Engineering & Technology 8, no. 4 (2019): 424. http://dx.doi.org/10.14419/ijet.v8i4.29655.

Full text
Abstract:
Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud
APA, Harvard, Vancouver, ISO, and other styles
20

Kim, JeongYeon, and Yanghoon Kim. "Benefits of cloud computing adoption for smart grid security from security perspective." Journal of Supercomputing 72, no. 9 (2015): 3522–34. http://dx.doi.org/10.1007/s11227-015-1547-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

., Harmeet Kaur. "COMPARISON OF DATA SECURITY IN GRID AND CLOUD COMPUTING." International Journal of Research in Engineering and Technology 02, no. 09 (2013): 136–45. http://dx.doi.org/10.15623/ijret.2013.0209022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

S.SyedNavaz, A., C. Prabhadevi, and V. Sangeetha. "Data Grid Concepts for Data Security in Distributed Computing." International Journal of Computer Applications 61, no. 13 (2013): 6–11. http://dx.doi.org/10.5120/9986-4823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Almadhor, Ahmad. "A Fog Computing based Smart Grid Cloud Data Security." International Journal of Applied Information Systems 10, no. 6 (2016): 1–6. http://dx.doi.org/10.5120/ijais2016451515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

R.Menaka, Author, and R. S. D. Wahidha Banu. "Security Analysis in Hierarchical Resource Arrangements in Grid Computing." International Journal of Computer Applications 24, no. 6 (2011): 34–39. http://dx.doi.org/10.5120/2947-3930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Song, Shanshan, Kai Hwang, and Yu-Kwong Kwok. "Trusted Grid Computing with Security Binding and Trust Integration." Journal of Grid Computing 3, no. 1-2 (2005): 53–73. http://dx.doi.org/10.1007/s10723-005-5465-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ben Dhaou, Imed, Aron Kondoro, Amleset Kelati, et al. "Communication and Security Technologies for Smart Grid." International Journal of Embedded and Real-Time Communication Systems 8, no. 2 (2017): 40–65. http://dx.doi.org/10.4018/ijertcs.2017070103.

Full text
Abstract:
The smart grid is a new paradigm that aims to modernize the legacy power grid. It is based on the integration of ICT technologies, embedded system, sensors, renewable energy and advanced algorithms for management and optimization. The smart grid is a system of systems in which communication technology plays a vital role. Safe operations of the smart grid need a careful design of the communication protocols, cryptographic schemes, and computing technology. In this article, the authors describe current communication technologies, recently proposed algorithms, protocols, and architectures for sec
APA, Harvard, Vancouver, ISO, and other styles
27

Zhou, Guo Hong. "Study of Cloud Computing and Advanced Manufacturing Technology under Information Technology Development." Applied Mechanics and Materials 484-485 (January 2014): 227–30. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.227.

Full text
Abstract:
Cloud computing can be regarded as the integration of grid computing and virtualization technology: namely the use of grid distributed computing processing power of IT resources and build into a resource pool, plus on a mature server virtualization, storage virtualization technology make users can real-time monitoring and deployment of resources. Cloud computing and advanced manufacturing technology is facing many challenges during the process of development in the future, including security and privacy will become a primary issue. This study focused on relations with the important areas of em
APA, Harvard, Vancouver, ISO, and other styles
28

Bai, Qing Hai, Ying Zheng, Qing Hu Wang, Guo Li Wei, Hai Chun Zhao, and Jing Long Zhang. "Research on Identity-Based Encryption Scheme for Grid Computing System." Applied Mechanics and Materials 543-547 (March 2014): 3156–59. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3156.

Full text
Abstract:
Grid system has secure requirements of confidential communication, data integrity and non-repudiation. According to the secure requirements for Grid service, the paper proposed an identity-based encryption scheme for Grid, which can solve a series of problem: the privacy of data transmission, validation of integrity of data, key update after long run time and non-repudiation. The scheme is constructed by bilinear paring on elliptic cures and its security can be reduced to the computational Bilinear Diffie-Hellman assumption. Finally, the authors analyses the security and efficiency of this sch
APA, Harvard, Vancouver, ISO, and other styles
29

Karamizadeh, Sasan, Jafar Shayan, Mojtaba Alizadeh, and Atabak Kheirkhah. "Information Security Awareness Behavior : A Conceptual Model for Cloud." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 1 (2013): 1186–91. http://dx.doi.org/10.24297/ijct.v10i1.3322.

Full text
Abstract:
Cloud computing has changed the whole picture that distributed computing used to present such as Grid computing, server client computing. Despite Cloud offers great benefits, it also introduces a myriad of security threats to the information and data which is now being ported from on-premises to off-premises. These security threats must be overcome in order to get full benefit from this new computing exemplar. This paper identifies the importance of awareness behaviour in context of information security for cloud. We investigate four important factors of security awareness behaviour that shou
APA, Harvard, Vancouver, ISO, and other styles
30

Tusa, Francesco, Massimo Villari, and Antonio Puliafito. "Credential Management Enforcement and Secure Data Storage in gLite." International Journal of Distributed Systems and Technologies 1, no. 1 (2010): 76–97. http://dx.doi.org/10.4018/jdst.2010090805.

Full text
Abstract:
This article describes new security solutions for Grid middleware, and specifically faces the issues related to the management of users’ and servers’ credentials, together with storing and secure data transmission in the Grid. Our work, built on Grid Security Infrastructure (GSI), provides new capabilities (i.e. smart card Grid access, and strong security file storage XML-based) to be used on top of different Grid middlewares, with a low level of changes. This work is currently implemented on gLite and accomplishes the access to Grid resources in a uniform and transparent way. These improvemen
APA, Harvard, Vancouver, ISO, and other styles
31

Adamski, Marcin, Krzysztof Kurowski, Marek Mika, Wojciech Piątek, and Jan Węglarz. "Security Aspects in Resource Management Systems in Distributed Computing Environments." Foundations of Computing and Decision Sciences 42, no. 4 (2017): 299–313. http://dx.doi.org/10.1515/fcds-2017-0015.

Full text
Abstract:
Abstract In many distributed computing systems, aspects related to security are getting more and more relevant. Security is ubiquitous and could not be treated as a separated problem or a challenge. In our opinion it should be considered in the context of resource management in distributed computing environments like Grids and Clouds, e.g. scheduled computations can be much delayed because of cyber-attacks, inefficient infrastructure or users valuable and sensitive data can be stolen even in the process of correct computation. To prevent such cases there is a need to introduce new evaluation m
APA, Harvard, Vancouver, ISO, and other styles
32

Kant Hiran, Kamal, Ruchi Doshi, and Rakesh Rathi. "Security & Privacy issues of Cloud & Grid Computing Networks." International Journal on Computational Science & Applications 4, no. 1 (2014): 83–91. http://dx.doi.org/10.5121/ijcsa.2014.4108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mann, Kulvinder Singh, and Ankit Bansal. "Security of Data of EHR in a Grid Computing Environment." International Journal of Computer Applications 7, no. 6 (2010): 11–14. http://dx.doi.org/10.5120/1168-1307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hwang, Kai, Min Cai, Yu Kwong Kwok, Shanshan Song, Yu Chen, and Ying Chen. "DHT-based security infrastructure for trusted internet and grid computing." International Journal of Critical Infrastructures 2, no. 4 (2006): 412. http://dx.doi.org/10.1504/ijcis.2006.011348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Mahajan, Rini, and Dr Dheerendra Singh. "Cloud Computing Issues." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 626–30. http://dx.doi.org/10.24297/ijct.v4i2c2.4185.

Full text
Abstract:
Abstract- Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. It aims to construct a perfect system with powerful computing capability through a large number of relatively low-cost computing entity, and using the advanced business models like SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) to distribute the powerful computing capacity to end users’ hands. Cloud Computing represents a new computing model that poses many demandi
APA, Harvard, Vancouver, ISO, and other styles
36

Weijie, Zheng, Xu Dechao, Chen Yong, Zhang Xing, and Mu Qing. "Multi Step Transient Hybrid Simulation Framework Design and Practical Engineering Application for AC / DC Power Grid." E3S Web of Conferences 256 (2021): 01010. http://dx.doi.org/10.1051/e3sconf/202125601010.

Full text
Abstract:
Based on the large power grid simulation and the existing security prevention and control mode, this paper further integrates the multi-step transient hybrid simulation architecture computing technology to research the high-performance analysis and situational awareness simulation technology of interconnected AC / DC large power grid security and stability characteristics. So as to realize the “panoramic situational awareness, wide area coordinated control, flexible and efficient service” of large power grid, and improve the super large scale power grid Comprehensive security defense and intel
APA, Harvard, Vancouver, ISO, and other styles
37

Bai, Qing Hai, Ying Zheng, and Lin Na Zhao. "The Application of IBE Encryption Scheme in Grid Environments." Applied Mechanics and Materials 551 (May 2014): 686–90. http://dx.doi.org/10.4028/www.scientific.net/amm.551.686.

Full text
Abstract:
The computing service and security service are separated in current Grid system, but the data transmission of the system has to cross unsafe public channel. This makes the results computing by the Grid system may be stolen or destroyed by artificial or non-artificial factors in transmission process. So the Grid system has secure requirements of confidential communication, data integrity and non-repudiation. For these requirements, this paper puts forward an identity-based encryption scheme and realizes the function of confidentiality, Integrity, Key Update and non-repudiation. To test the secu
APA, Harvard, Vancouver, ISO, and other styles
38

Deng, Song, Wei Min Lin, Tao Zhang, and Yuan Yuan Ma. "Security Access of Power terminal on Trusted Computing in Smart Grid." Applied Mechanics and Materials 241-244 (December 2012): 2659–64. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2659.

Full text
Abstract:
With the development of interactive business for smart grid, for the security access requirement of kinds of business terminal, this paper proposed security access of power terminal on trusted network connection in power of things which combined with power of things and kinds of power terminals on the basis of trusted network connection. By discussing in detail security access architecture of power terminal and flow, the feasibility of program design is confirmed.
APA, Harvard, Vancouver, ISO, and other styles
39

Yu, Qiu Dong, Yun Chen Tian, and Xu Feng Hua. "Research on Security of Agricultural Information Model Based on Cloud Computing." Applied Mechanics and Materials 687-691 (November 2014): 1970–73. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1970.

Full text
Abstract:
In 2007, as a new computing paradigm, Cloud Computing go into people's sight. It is a technology that develop with the parallel computing, distributed computing, utility computing, a new computing paradigm and the emergence of grid computing development. It is also the result of network storage, virtualization and load balancing development. As an Internet-based super computing paradigm, cloud computing allows users to dynamically share the hardware, software, and data resources. In the process of sharing resources, it is inevitable to involve security issues of network transmission. In order
APA, Harvard, Vancouver, ISO, and other styles
40

Tang, Bi Qiang, Yi Jun Yu, Shu Hai Feng, and Feng Li. "A Novel Method of Static Security Analysis Based on Multithread Technology." Advanced Materials Research 732-733 (August 2013): 639–45. http://dx.doi.org/10.4028/www.scientific.net/amr.732-733.639.

Full text
Abstract:
With the UHV (Ultra High Voltage) power grid construction and the interconnection of regional power grids, the scale of power grids in China is increasing rapidly. At the same time, significant uncertainty and variability is being introduced into power grid operation with the integration of large-scale renewable energy in power systems. All of these pose an enormous challenge to the operation control of power systems in China. For a long time, online static security analysis, as an important part of EMS (Energy Management System), has been an effective tool for power grid operation. However, i
APA, Harvard, Vancouver, ISO, and other styles
41

Kolosok, Irina, and Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation." E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.

Full text
Abstract:
Development of Smart Grid involves the introduction of Wide Area Measurement System (WAMS), which provides the use of information, computing and digital technologies for measuring, transmitting and processing operating parameters when solving control problems. In this regard, the increased vulnerability to cyberattacks of the control system was noted. The control of Smart Grid includes monitoring, forecasting and planning of the system operation based on its Electric Power System state estimation results. Therefore, the goal of the paper is to develop a mathematical instrument to bad data dete
APA, Harvard, Vancouver, ISO, and other styles
42

Jaiswal, Rituka, Reggie Davidrajuh, and Chunming Rong. "Fog Computing for Realizing Smart Neighborhoods in Smart Grids." Computers 9, no. 3 (2020): 76. http://dx.doi.org/10.3390/computers9030076.

Full text
Abstract:
Cloud Computing provides on-demand computing services like software, networking, storage, analytics, and intelligence over the Internet (“the cloud”). But it is facing challenges because of the explosion of the Internet of Things (IoT) devices and the volume, variety, veracity and velocity of the data generated by these devices. There is a need for ultra-low latency, reliable service along with security and privacy. Fog Computing is a promising solution to overcome these challenges. The originality, scope and novelty of this paper is the definition and formulation of the problem of smart neigh
APA, Harvard, Vancouver, ISO, and other styles
43

Sharma, Gaurav, Urvashi Garg, A.P, Arun Jain, A.P, and Loveleena Mukhija, A.P. "Cloud Computing : Security Issues And Resource Allocation Policies." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 176. http://dx.doi.org/10.23956/ijarcsse/v7i7/0116.

Full text
Abstract:
Cloud computing is the combination of distributed computing, grid computing and parallel technologies which define the shape of a new era. In this technology client data is stored and maintain in the data center of a cloud provider like Google, Amazon and Microsoft etc. It has inherited the legacy technology and including unique ideas. Industries, such as education, banking and healthcare are moving towards the cloud due to the efficiency of services such as transactions carried out, processing power used, bandwidth consumed, data transferred etc. There are various challenges for adopting clou
APA, Harvard, Vancouver, ISO, and other styles
44

Rahman, Gohar, and Chuah Chai Wen. "Fog Computing, Applications, Security and Challenges, Review." International Journal of Engineering & Technology 7, no. 3 (2018): 1615. http://dx.doi.org/10.14419/ijet.v7i3.12612.

Full text
Abstract:
The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and stora
APA, Harvard, Vancouver, ISO, and other styles
45

Lu, Zhi Yong, Yi Jun Zhang, Luan Yang, Shi Ping Xu, and Yuan You Chen. "Research on the Security Technologies of Power Grid EMS Based on SOA." Applied Mechanics and Materials 347-350 (August 2013): 1846–51. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1846.

Full text
Abstract:
This article analyzes the accidents of power grid in some domestic region to discuss the security problems existing in the power grid Energy Management Systems (EMS). Combined with the security requirements of EMS, the method of improving EMS security based on SOA is proposed and the involving key technologies are studied as follows: the loosely coupled EMS based on SOA, the graded and modularity security configuration, the management of security configuration based on Concurrent Version System (CVS) and the mirror of Real-Time Databases (RTD) based on cloud computing. All the above technologi
APA, Harvard, Vancouver, ISO, and other styles
46

Zhu, You Chan, and Juan Hua Bai. "A Study of Push-Based Sequence Authorization Mechanism for Grid Security." Applied Mechanics and Materials 63-64 (June 2011): 59–63. http://dx.doi.org/10.4028/www.scientific.net/amm.63-64.59.

Full text
Abstract:
Grid security is one of the core issues of grid computing, and the authorization issue of grid security is a hot topic of current research. This paper describes three sequence patterns of the authorization, and focuses on the architecture of push sequence model and application example-Community Authorization Service (CAS). It analyzes and compares the push sequence pattern and pull sequence pattern. Authorization mechanism based on push sequence pattern solves the scalability issue of GSI quite well in some extent and improves the flexibility of the system.
APA, Harvard, Vancouver, ISO, and other styles
47

Namane, Sarra, and Nassira Ghoualmi. "Parallel Access Control Model in Cross-Domain Grid Computing Environment." International Journal of Embedded and Real-Time Communication Systems 9, no. 1 (2018): 50–65. http://dx.doi.org/10.4018/ijertcs.2018010103.

Full text
Abstract:
Despite the various attractive features that grid computing has to offer, it has many great security challenges, such as access control. With the expansion of the network scale, a large number of authorization requests have to be treated; on the other hand, the multi-domain nature of grid computing generates difficult to manage questions about cross-domain access control, and a variety of solutions use the role mapping mechanism to allow collaborations between domains. But this mechanism gives a potential risk of violating consistency properties of domains. This article aims to address this is
APA, Harvard, Vancouver, ISO, and other styles
48

Crooks, David, Liviu Vâlsan, Kashif Mohammad, et al. "Operational security, threat intelligence & distributed computing: the WLCG Security Operations Center Working Group." EPJ Web of Conferences 214 (2019): 03029. http://dx.doi.org/10.1051/epjconf/201921403029.

Full text
Abstract:
The modern security landscape for distributed computing in High Energy Physics (HEP) includes a wide range of threats employing different attack vectors. The nature of these threats is such that the most effective method for dealing with them is to work collaboratively, both within the HEP community and with partners further afield - these can, and should, include institutional and campus security teams. In parallel with this work, an appropriate technology stack is essential, incorporating current work on Big Data analytics. The work of the Worldwide LHC Computing Grid (WLCG) Security Operati
APA, Harvard, Vancouver, ISO, and other styles
49

Mehmood, M. Yasir, Ammar Oad, Muhammad Abrar, et al. "Edge Computing for IoT-Enabled Smart Grid." Security and Communication Networks 2021 (July 13, 2021): 1–16. http://dx.doi.org/10.1155/2021/5524025.

Full text
Abstract:
Smart grid is a new vision of the conventional power grid to integrate green and renewable technologies. Smart grid (SG) has become a hot research topic with the development of new technologies, such as IoT, edge computing, artificial intelligence, big data, 5G, and so on. The efficiency of SG will be increased by smart embedded devices that have intelligent decision-making ability. Various types of sensors and data sources will collect data of high resolution. One of the vital challenges for IoT is to manage a large amount of data produced by sensors. Sending this massive amount of data direc
APA, Harvard, Vancouver, ISO, and other styles
50

Riguidel, M., I. Demeure, and S. Naqvi. "Security Architecture for Health Grid Using Ambient Intelligence." Methods of Information in Medicine 44, no. 02 (2005): 202–6. http://dx.doi.org/10.1055/s-0038-1633947.

Full text
Abstract:
Summary Objectives: To propose a novel approach of incorporating ambient intelligence in the health grid security architecture. Methods: Security concerns are severely impeding the grid community effort in spreading its wings in health applications. In this paper, we have proposed a high level approach to incorporate ambient intelligence for health grid security architecture and have argued that this will significantly improve the current state of the grid security paradigm with an enhanced user-friendly environment. We believe that the time is right to shift the onus of traditional security m
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!