2008
DOI: 10.1109/msp.2008.12
|View full text |Cite
|
Sign up to set email alerts
|

Grid Computing Security: A Taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0
1

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(23 citation statements)
references
References 9 publications
0
22
0
1
Order By: Relevance
“…[9] The basic components for grid based IDS systems include: Sensors, which are able to monitor the state of grid systems. The information collected by sensors are then collected and analyzed by IDS system like SNORT [10].…”
Section: Related Workmentioning
confidence: 99%
“…[9] The basic components for grid based IDS systems include: Sensors, which are able to monitor the state of grid systems. The information collected by sensors are then collected and analyzed by IDS system like SNORT [10].…”
Section: Related Workmentioning
confidence: 99%
“…The security of such a system is a crucial issue. Not only the data has to be secured but also the resources and calculations must be protected from inadequate access [2]. Furthermore; the dynamicity and multi-domain characteristics of grid environments have created access control related challenges [3].…”
Section: Introductionmentioning
confidence: 99%
“…Security has been a central issue in grid computing from the outset, and has been regarded as the most significant challenge for grid computing [7], [15]. Security over the mobile platform is more critical due to the open nature of wireless networks.…”
Section: Introductionmentioning
confidence: 99%