2010
DOI: 10.1016/j.future.2009.08.004
|View full text |Cite
|
Sign up to set email alerts
|

An integrated security-aware job scheduling strategy for large-scale computational grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 31 publications
0
9
0
Order By: Relevance
“…Makespan and P failure appearing in (2) are the numeric values of the corresponding metrics, and not the metrics themselves. Hence, the fitness function is expressed by an absolute number and not by specific Encoded Solution (18,25,9,11,22,19) f itness = 100 w 1 * makespan + w 2 * P f ailure (2) In the initial population generation step, a predefined number of chromosomes are generated, the collection of which form the initial population. In a typical GA, the initial population is constituted of a pool of solutions, which is randomly formed.…”
Section: Traditional Genetic Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Makespan and P failure appearing in (2) are the numeric values of the corresponding metrics, and not the metrics themselves. Hence, the fitness function is expressed by an absolute number and not by specific Encoded Solution (18,25,9,11,22,19) f itness = 100 w 1 * makespan + w 2 * P f ailure (2) In the initial population generation step, a predefined number of chromosomes are generated, the collection of which form the initial population. In a typical GA, the initial population is constituted of a pool of solutions, which is randomly formed.…”
Section: Traditional Genetic Algorithmmentioning
confidence: 99%
“…For instance, it is well known that a Grid system is an unreliable environment by nature. The submitted jobs are subject to failures caused by infected hardware, software vulnerability, network failure, overloaded resource conditions, non-availability of required resource and distrusted security policy [22]. A general security architecture of a computational Grid is presented in [23], while a secure architecture specialized in service discovery is studied in [24].…”
Section: Introductionmentioning
confidence: 99%
“…It allowed both detection of potential failures as well as handling the user's security requirements without the need to constantly update the scheduling policy at local computational nodes. Insecure conditions in on-line job scheduling caused by software vulnerabilities were also analyzed by Wu and Sun (2010) by considering the heterogeneity of the fault-tolerant mechanisms employed in security-assured job scheduling.…”
Section: State Of the Artmentioning
confidence: 99%
“…The results presented in [9] were extended in [13] by considering the heterogeneity of the fault-tolerance mechanism in a security-assured Grid job scheduling. The authors defined four types of GA-based on-line schedulers for the simulation of some fault-tolerance mechanisms, including job retry, job migration (with and without check-pointing), and job replication mechanisms.…”
Section: Related Workmentioning
confidence: 99%