Lead Grid Security Casting Environmental overnance Practices
نویسندگان
چکیده
منابع مشابه
Casting up Accounts in Social Security
I N SOCIAL LEGISLATION i t is impossible to cast up accounts i n the exact sense t h a t we do when the mat ter is ent i re ly one of dollars and cents, w i t h out human values to be taken in to consideration. Nevertheless, i t seems to me tha t i n the field of social legisla t i on i t is wel l for us t o pause occasionally to see how far we have come and what we might do to move a l i t t l...
متن کاملSecurity in grid computing
In this paper, first we survey security problems which exist in grid computing and then we analyze security requirements. At the end we introduce a framework which Erin Cody has posed as a solution for security problems of grid computing. The framework presented classifies security literature into System Solutions, Behavioral Solutions and Hybrid Solutions.
متن کاملGrid security: Next steps
One of the more mature instances of a serviceoriented architecture is the model known as Grid Computing. Computational Grids and Data Grids are becoming commonplace in certain sectors, yet the style of security they implement is suitable only for a fairly small subset of possible user communities. Using some case studies and experience, we describe the existing Grid security models, explain why...
متن کاملSecurity for Grid Services
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations.” The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new technical approaches. In particular, one must deal with diverse local mechanisms, support dynamic creation of services, and enable dynamic creation of ...
متن کاملModel checking grid security
Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties thatmay leaddesigners into error. This is similar towhat happenswith security protocolswhere automatic verification techniques (speciallymodel checking) have been proved to be very useful at desi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Instrumentation and Equipments
سال: 2015
ISSN: 2332-6980,2332-7006
DOI: 10.12677/iae.2015.33013